US20040165592A1 - Extended virtual user-to-network interface with ATM network - Google Patents

Extended virtual user-to-network interface with ATM network Download PDF

Info

Publication number
US20040165592A1
US20040165592A1 US10/369,505 US36950503A US2004165592A1 US 20040165592 A1 US20040165592 A1 US 20040165592A1 US 36950503 A US36950503 A US 36950503A US 2004165592 A1 US2004165592 A1 US 2004165592A1
Authority
US
United States
Prior art keywords
virtual
svc
uni
unis
vps
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/369,505
Other versions
US7382785B2 (en
Inventor
Wenge Chen
Peter Chou
Kuo-Hui Liu
Michael Sinwald
Shih Chung Soon
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AT&T Intellectual Property I LP
Original Assignee
SBC Properties LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SBC Properties LP filed Critical SBC Properties LP
Priority to US10/369,505 priority Critical patent/US7382785B2/en
Assigned to SBC PROPERTIES, L.P. reassignment SBC PROPERTIES, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SINWALD, MICHAEL P., CHEN, WENGE, CHOU, PETER, LIU, KUO-HUI, SOON, SHIH CHUNG
Publication of US20040165592A1 publication Critical patent/US20040165592A1/en
Assigned to SBC KNOWLEDGE VENTURES, L.P. reassignment SBC KNOWLEDGE VENTURES, L.P. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SBC PROPERTIES, L.P.
Assigned to AT&T KNOWLEDGE VENTURES, L.P. reassignment AT&T KNOWLEDGE VENTURES, L.P. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SBC KNOWLEDGE VENTURES, L.P.
Priority to US12/057,581 priority patent/US7839866B2/en
Application granted granted Critical
Publication of US7382785B2 publication Critical patent/US7382785B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2854Wide area networks, e.g. public data networks
    • H04L12/2856Access arrangements, e.g. Internet access
    • H04L12/2869Operational details of access network equipments
    • H04L12/2878Access multiplexer, e.g. DSLAM
    • H04L12/2879Access multiplexer, e.g. DSLAM characterised by the network type on the uplink side, i.e. towards the service provider network
    • H04L12/2883ATM DSLAM
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5614User Network Interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5629Admission control
    • H04L2012/563Signalling, e.g. protocols, reference model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/25Routing or path finding in a switch fabric
    • H04L49/253Routing or path finding in a switch fabric using establishment or release of connections between ports

Definitions

  • the present invention relates to the field of communications. More particularly, the present invention relates to dynamically establishing broadband quality of service (QoS) connections, on demand, between peers on a network to guarantee application specific IP QoS via the combination of ATM switched virtual connections (SVCs) and permanent virtual connection (PVCs).
  • QoS quality of service
  • SVCs ATM switched virtual connections
  • PVCs permanent virtual connection
  • Alternative processes including (i) dynamically establishing an SVC shortcut connection from a peer device using an SVC signaling proxy device without going through an ISP, and (ii) creating multiple virtual user-to-network interfaces (UNIs) within a single virtual path (VP) at each port of an ATM edge switch to establish SVCs between subscribers.
  • Network carriers are currently providing broadband access services to a large number of subscribers using asynchronous transfer mode (ATM) and digital subscriber lines (DSL).
  • ATM Internet transfer mode
  • DSL digital subscriber lines
  • ISP Internet service provider
  • PPP point-to-point protocol
  • PPPoE point-to-point protocol over Ethernet
  • a single virtual UNI which supports ATM network access of a single subscriber, requires an entire VP, even though most of the virtual channels (VCs) within the VP are not needed to support the SVC.
  • a limited number of VPs are available at each port of an ATM edge switch and/or a digital subscriber line access multiplexer (DSLAM) connected to the ATM edge switch, which accordingly restricts the number of UNIs that may be supported by the network at any one time.
  • DSLAM digital subscriber line access multiplexer
  • FIG. 1 is a block diagram showing an exemplary network architecture for proxy signaling, according to an aspect of the present invention
  • FIG. 2 is a block diagram illustrating an exemplary relationship between logical components of proxy signaling, according to an aspect of the present invention
  • FIG. 3 is a block diagram showing an exemplary network architecture for proxy signaling, according to another embodiment of the present invention.
  • FIG. 4 is a table showing an exemplary VPI/VCI arrangement for Extended Virtual UNI, according to an aspect of the present invention
  • FIG. 5 is an exemplary call flow diagram showing an SVC being set up using Extended Virtual UNI, according to an aspect of the present invention.
  • FIG. 6 is a block diagram showing an exemplary network architecture for Extended Virtual UNI, according to an aspect of the present invention.
  • the present invention relates to establishing broadband QoS connections between peers on an ATM network to guarantee application specific IP QoS, through SVCs and PVCs.
  • an SVC may be dynamically established by a proxy signaling alternative, discussed below.
  • an SVC may be efficiently established through one of many UNIs set up within a single VP at each port of an ATM edge switch, referred to as Extended Virtual UNI.
  • An aspect of the present invention provides a method for establishing at least one SVC through an ATM switch port, which includes multiple VPs, by associating multiple virtual UNIs to each of the VPs.
  • Each VP includes multiple VC ranges, each of which corresponds to a different virtual UNI.
  • each VC range includes at least one VC for control and at least one VC for data transfer.
  • Associating the virtual UNIs to each of the VPs of the ATM switch port may include mapping each virtual UNI to a corresponding VC range within a VP based on a VPI/VCI of the virtual UNI initially received by the ATM switch port.
  • Another aspect of the present invention provides a method for supporting multiple virtual UNIs within a single VP, which includes multiple VCs.
  • the method includes assigning a virtual UNI to the VP, and assigning at least one control VC and at least one data VC of the VP to the virtual UNI, such that the at least one data VC is contiguous with the at least one control VC.
  • Multiple virtual UNIs are thus available for the VP.
  • a QoS may be associated with an application of the virtual UNI. At least one of the control and data VCs are then assigned based on the QoS.
  • a minimum number of contiguous data VCs needed to support the QoS may be determined. The determined number of data VCs is assigned to the virtual UNI. Likewise, a minimum number of contiguous control VCs needed to support the QoS may be determined. The determined number of control VCs is assigned to the virtual UNI. One of the at least one control VCs is a signaling channel. The minimum number of data VCs or control VCs may be as few as one VC.
  • Another aspect of the present invention provides a method for establishing an SVC in an ATM network by receiving a signaling message, via a virtual UNI, to set up the SVC, and assigning the virtual UNI to a range of VCs within a single VP based on a VPI/VCI of the signaling message.
  • the VP includes at least one additional range of VCs assigned to another virtual UNI.
  • the SVC is then established using the range of VCs assigned to the virtual UNI.
  • Another aspect of the present invention provides a system for establishing at least one SVC in an ATM network, including an ATM network element having multiple ports, each of which supports multiple VPs.
  • the ATM network element may include an ATM edge switch or a DSLAM.
  • the ATM network element associates multiple virtual UNIs to each of the VPs.
  • Each VP includes multiple VC ranges, each of which corresponds to a different virtual UNI of the mulitple virtual UNIs.
  • Each VC range includes at least one VC for control, including signaling, and at least one VC for data transfer.
  • the ATM network element may associate the virtual UNI's to each VP by mapping each virtual UNI to a corresponding VC range within the VP, based on a VPI/VCI of the virtual UNI initially received at a corresponding port.
  • Yet another aspect of the present invention provides a computer readable medium for storing a computer program that establishes at least one SVC by way of an ATM switch port, which includes multiple VPs.
  • the computer readable medium includes an associating source code segment that associates multiple virtual UNIs to each of the VPs.
  • Each VP includes multiple VC ranges, each of which corresponds to a different virtual UNI of the multiple virtual UNIs.
  • each VC range includes at least one VC for control and at least one VC for data transfer.
  • the computer readable medium may further include a mapping source code segment that maps each virtual UNI to a corresponding VC range within a VP based on a VPI/VCI of the virtual UNI initially received by the ATM switch port.
  • the associating source code segment associates the multiple virtual UNIs to each of the VPs based on the mapping.
  • the computer readable medium may also include a determining source code segment that determines a size of each VC range based on an application of the corresponding virtual UNI.
  • FIG. 1 is a block diagram depicting an exemplary network infrastructure in which the present invention operates, as it relates to proxy signaling.
  • a source subscriber's computer 10 is connected to a DSL ATU-R 12 at the subscriber's premises.
  • the subscriber's computer is referred to as a PC in the following description, the computer is not limited to a personal computer. Rather the subscriber's computer (also referred to as a client) can be any device capable of communicating to an ISP.
  • An exemplary DSL ATU-R is the SpeedStream 5360 DSL Model, available from Efficient Networks, Inc. of Dallas Tex.
  • the DSL ATU-R 12 connects to a DSLAM 14 using a pre-existing digital subscriber line.
  • the DSLAM 14 is connected to a high speed network, e.g., an ATM network 16 .
  • the DSLAM 14 connects to an ATM edge switch 15 , which operates as a gateway into the ATM network 16 .
  • ATM edge switch 15 which operates as a gateway into the ATM network 16 .
  • the ATM network 16 includes a number of ATM switches 15 , 17 , 19 .
  • Exemplary switches include the Alcatel 7670 Routing Switch Platform, available from Compagnie Financière Alcatel of Paris, France.
  • An exemplary DSLAM 14 is the Alcatel 7300 Advanced Services Access Manager, available from Compagnie Financière Alcatel of Paris, France.
  • An edge ATM switch 17 of the ATM network 16 connects via the Internet 20 to a service provider's broadband remote access server (B-RAS) 22 .
  • B-RAS 22 terminates PPP connections for each DSL subscriber 10 .
  • An exemplary B-RAS 22 is an SMS 1800, available from Redback Networks Inc. of San Jose, Calif.
  • the B-RAS 22 connects to the Internet service provider 24 .
  • the connection to the Internet service provider (ISP) 24 is via a local connection, such as an Ethernet connection.
  • connection from the subscriber 10 to the B-RAS 22 is pre-provisioned and it will be referred to as a signaling connection or a control connection.
  • control connection is a manually configured PVC though which a PPP session is established.
  • the subscriber 10 can dynamically select a peer device, such as the destination subscriber device 40 , to communicate with and can request QoS connections to the peer device by communicating over the control connection.
  • the QoS connection to the peer device 40 is a dynamically established SVC 50 .
  • an SVC is merely a non-limiting example of a QoS connection; and another type of QoS connection, such as Soft Permanent Virtual Circuit (SPVC), can be used instead of an SVC without departing from the scope and spirit of the present invention.
  • SPVC Soft Permanent Virtual Circuit
  • An example of when a subscriber 10 might desire such a QoS connection is when the subscriber 10 desires to engage in a video conference with another subscriber 40 .
  • the subscriber 10 transmits a connection setup request to the connection server 25 .
  • subscriber refers to the combination of the client and an associated network service agent.
  • the client communicates to the connection server 25 via an API to a software component, the network service agent, which is located on the client (bridge model) or ATU-R (routed model).
  • the request, originating from the subscriber 10 is transmitted to the connection server 25 over the subscriber's best effort connection to the ISP 24 .
  • the request includes information about the SVC 50 (or SVCs, each being associated with a different application) to be setup, including the destination subscriber 40 , a shared session key agreed upon by subscriber 10 and subscriber 40 , a class of service of the SVC 50 , and a traffic descriptor of the SVC 50 .
  • the class of service can be, for example, constant bit rate (CBR) or variable bit rate (VBR).
  • CBR constant bit rate
  • VBR variable bit rate
  • the traffic descriptor describes the requested bandwidth in terms of ATM standard traffic descriptors, e.g., by sustained cell rate (SCR), peak cell rate (PCR), and maximum burst size (MBS).
  • the connection server 25 queries an LDAP 30 for information about the subscriber 10 and the subscriber 40 .
  • the LDAP 30 receives such subscriber information, and information about the network as part of the provisioning process flow.
  • Exemplary subscriber and network information includes the following information for both subscriber 10 /switch 15 and subscriber 40 /switch 19 : the switch identifier of the switch 1 (possibly an IP address or switch specific proprietary address); the physical port number and the logical port number; end system addresses, e.g., ATM end system address (AESA), of source and destination UNIs; a set of VPI/VCIs at the source UNI and a set of VPI/VCIs at the destination UNI; and an address (e.g., an IP address) of a proxy signaling agent (PSA) 35 .
  • the LDAP 30 also stores some other network related information, such as up-link port speeds and DSL synchronization rates needed for the connection server to calculate total available bandwidths and perform the CAC function for A
  • Authorization and authentication information can also be retrieved from a RADIUS server 28 , if necessary.
  • accounting records can be stored on the RADIUS server 28 .
  • the RADIUS server 28 is provisioned with the user authentication information (username and password) as part of the customer management flow.
  • the destination subscriber 40 must also perform the previously described actions by requesting a connection to the source subscriber 10 with identical parameters after the subscriber 40 receives the application session setup message from subscribe 10 through the best effort connection.
  • the connection server 25 By receiving connection requests from both subscribers 10 , 40 within a time-out period, the connection server 25 considers the connection request to be both originated and accepted by both subscribers 10 , 40 .
  • the connection server 25 After the necessary information, such as the AESAs, VPI/VCIs, class of service, and bandwidth, etc., is obtained from the LDAP 30 and the RADIUS server 28 , the connection server 25 performs a call admission control (CAC) step to determine if sufficient available bandwidth exists in the ATU-Rs and DSLAMs to accommodate the connection request.
  • the connection server 25 maintains state information of the currently available bandwidth at each subscriber's ATU-R and related DSLAM up-links. If sufficient bandwidth is available, then the connection server 25 sends the SVC request and the necessary information to a proxy signaling agent 35 .
  • the proxy signaling agent 35 is responsible for performing the SVC signaling and relaying results and status information from the network elements to the connection server 25 . That is, the proxy signaling server 35 communicates with the SVC capable ATM network 16 to establish, to tear down, and to obtain the status of SVC connections, and to obtain information about resource availability.
  • the proxy signaling agent 35 After receiving the necessary information, the proxy signaling agent 35 communicates with the requesting subscriber's edge switch 15 to initiate an SVC 50 to the destination subscriber's edge switch 19 .
  • the proxy signaling agent 35 informs the edge switch 15 of the destination switch address and then the SVC 50 is set up in the standard manner.
  • the proxy signaling agent 35 informs the connection server 25 , then the connection server 25 sends a message to both subscribers, specifically the network service agent associated with each client, informing them of the successful connection establishment. Then the routing tables are updated in both subscribers' PCs (for bridge mode) or ATU-Rs (for router mode) so that QoS application packets can be sent over the new QoS connection. In the bridge mode, a packet mapping table is also modified in the ATU-R. As is well known, every PC has a routing table to provide the routing information when multiple IP interfaces are available for outbound IP traffic.
  • Routing entries in the routing table typically follow the syntax of ⁇ destination IP network address, network mask, gateway IP address, interface IP address, metric>.
  • the operating system routing function will forward a packet according to the longest matched routing entries in the routing table based on the destination address in the packet.
  • the location of the routing tables varies.
  • the routing table is stored on the source subscriber's computer 10 .
  • the routing tables are stored on the subscriber's ATU-R 12 .
  • traffic packets are transmitted from the source subscriber 10 over either the new QoS connection or the default route to the ISP, based upon whether or not the packet originates from an application associated with the new QoS connection. For example, if the application requesting the SVC 50 is a video conferencing application and the packets being transmitted originate from the video conferencing application, then the video conferencing packets are transmitted over SVC 50 . In other words, the packets travel from the subscriber 10 , through the PVC from ATU-R 12 to the DSLAM 14 , the SVC 50 from the ATM switch 15 to the ATM switch 19 , and the PVC from the DSLAM 44 to the ATU-R 44 and finally to the destination subscriber 40 . If the packet originates from other applications than the QoS application, the packets are transmitted, as usual, via the default route (or routes) to the ISP 24 and then on to its intended destinations.
  • Policy based routing ensures QoS for specific end user applications.
  • the policy based routing capability is dynamic. That is, the policy based routing only occurs during a session, e.g., during a video call.
  • the ATU-R 12 receives a signal indicating the session termination and the pattern matching and filtering cease. Accordingly, all traffic is routed over the normal channel.
  • Policy based routing thus occurs when an SVC 50 has been set up.
  • the PC 10 sends a header pattern to the ATU-R 12 so that the ATU-R 12 knows to filter traffic matching the received pattern.
  • the ATU-R 12 knows to send the traffic matching the header pattern to the new QoS connection.
  • the packet is sent along its normal route.
  • the syntax of the policy routing instruction is: ⁇ source IP network address, source network mask, destination IP network address, destination network mask, IP protocol ID, type of service (TOS), source port number, destination port number, gateway IP address, interface IP address, metric>.
  • the IP protocol ID parameter defines the layer 4 protocol.
  • the type of service parameter refers to a field in the IP header to carry information on traffic packet priority, e.g., best effort, highest priority, etc.
  • the gateway IP address refers to the next hop.
  • the interface IP address refers to the egress port.
  • the metric defines an administrator assigned weight, the weight being assigned to different routes, e.g., hop count.
  • routing policy is as follows: 64.2.12.3 255.255.255.0 217.34.67.122 255.255.255.255 17 8 6000 66.2.12.1 64.2.12.3 1. Then, all packets having the value matching this specific policy will be directed to gateway 66.2.12.1 via 64.2.12.3, which is a local interface IP address.
  • FIG. 3 another embodiment is described in which multiple proxy signaling servers 35 , 36 are provided.
  • the source subscriber 10 and the destination subscriber 40 may be assigned to different proxy signaling agents 35 , 36 at the LDAP 30 .
  • the setup process is slightly different. If both subscribers 10 , 40 are located within the same ATM domain, the connection must choose which side to originate the SVC connection and to contact the originator's proxy signaling agent 35 to set up the connection. If the subscribers 10 , 40 are located in different ATM domains (as shown in FIG.
  • connection server 25 establishes two connection segments, one originating at each subscriber, to a common network to network interface (NNI) meeting point.
  • the connection server 25 can retrieve available NNI information from the LDAP 30 to handle these types of connections.
  • the connection server 25 can also track real time state information about NNI usage.
  • the ATU-R 12 functions like a traditional router. That is, the ATU-R 12 examines the layer 3 and layer 4 information and routes packets based upon such information. Accordingly, the ATU-R 12 routes at the application level. In this embodiment, the routing table resides at the ATU-R 12 . Moreover, it is well known that in the router mode the PPPOE session from subscriber to ISP originates on the ATU-R 12 .
  • the ATU-R 12 functions like an Ethernet bridge with additional packet mapping capabilities. Ethernet bridges without additional mapping capabilities have no IP awareness and can only perform switching at a host level of granularity. The switching is based on MAC addresses, which are unique per client.
  • the routing table resides at the client 10 and the client 10 performs the routing.
  • a packet mapping filter at the ATU-R switches the packets into different outgoing PVCs based on mapping rules associated with each QoS session. These rules consider layer three and layer four header information in a manner similar to the described policy routing method.
  • a client DSL dialer application establishes a standard, best effort PPPoE session between the client PC 10 and the ISP B-RAS 22 .
  • the ISP 24 provides the client 10 with a public IP address, which is globally reachable.
  • the ISP 24 assigns the ATU-R 12 a global IP address and the ATU-R 12 performs NAT for private addresses that it, in turn, assigns to the client 10 .
  • the PC decides whether to send traffic over the PPP session or directly to the ATU-R over Ethernet.
  • the packet received at the ATU-R requires an additional mapping step.
  • the ATU-R determines which PVC to send the traffic over.
  • One PVC is assigned to the PPP session, and other PVCs can match different SVCs in the ATM network.
  • the additional mapping step is enabled by a mapping table in the ATU-R that shows which PVCs are currently attached to SVCs. Although all packet travels through the ATU-R, some packets are encapsulated in a PPP session, whereas other packets are raw IP packets transported via the Ethernet connection.
  • header patterns are always sent to the ATU-R.
  • the header patterns that are sent are the same header patterns that the PC uses to determine whether to encapsulate the packet. That is, the PC decides whether to use PPP or not, and the ATU-R decides which PVC to use. Once an SVC is set up, both tables are updated.
  • connection server 25 terminates customer control channel sessions, which transit the public IP network.
  • the control channel session is used by the customers to send CONNECT and DISCONNECT requests to the connection server 25 .
  • the connection server 25 in return, reports connection status information to the customers using the control channel session.
  • this control channel session employs authentication and encryption.
  • the connection server 25 maintains two levels of sessions: (1) a per user session anchored on the control channel connection; and (2) a per SVC session anchored on individual SVC connections set up by the service.
  • a user session that is associated with the user ID.
  • an SVC session is created. If the user establishes another SVC, another SVC session is created.
  • each user session may be associated with multiple SVC sessions.
  • connection server 25 performs the CAC function for the user ATU-R and DSLAM ports and is able to manage the complex topology of any DSLAM 14 . This is necessary because the pre-provisioned PVCs in the ATU-R 12 and DSLAM 14 will require over subscription of the priority bandwidth on the DSLAM up-link ports. Over subscription occurs when a group of PVCs, with aggregate bandwidth exceeding the actual available bandwidth, are created. It is assumed that, statistically, only a fraction of the PVCs are active simultaneously and that the bandwidth used by the active fraction does not exceed the actual available bandwidth. It is advantageous to service providers to over subscribe network resources to take advantage of this statistical multiplexing effect.
  • a DSLAM up-link may have enough bandwidth to handle ten simultaneous QoS connections.
  • the service provider may choose to provision twenty QoS PVCs on that up-link if it is expected that typically only ten or fewer of the QoS PVCs are in use at one time.
  • the connection server CAC function would prevent the eleventh QoS PVC from becoming active should the actual usage exceed the expected usage. Only as many pre-provisioned QoS PVCs may be active as there is bandwidth available thus ensuring the QoS of the active connections.
  • the connection server 25 can be any server class system, such as a UNIX workstation.
  • the connection server 25 tracks the PVCs' status in real time, monitoring whether the PVCs are in use or available. If multiple applications share a PVC, the connections server 25 monitors how much available bandwidth is allocated to each application. When enough bandwidth is not available for a connection request, the connection server 25 denies service requests.
  • the connection server 25 handles association of PVCs and SVCs, and also reserves space on PVCs.
  • each DSLAM actually includes a master DSLAM and at least one slave DSLAM.
  • the connections server 25 is aware of the DSLAM topology, e.g., the total bandwidth available on a DSLAM trunk port. The topology information is useful so that the connection server 25 is aware of which PVCs are used to connect from the trunk port of the master DSLAM to the appropriate subscriber port.
  • the connections server 25 ensures that enough bandwidth exists for a connection request, and if so, grants the bandwidth to the user.
  • a subscriber SVC-enabled application 100 running on the client PC, negotiates with a peer to establish agreed upon parameters for a direct SVC connection. This negotiation occurs using the best effort PPPoE channel, i.e., the control channel. Both SVC-enabled end points must agree upon a required class of service, a required bandwidth or bit rate, and a shared secret or session key that uniquely identifies the proposed session between these two end points.
  • the mechanism of this negotiation is independent of the SVC service.
  • the negotiation could be an Instant Messaging server facilitated negotiation or a voice telephone call between users.
  • the subscriber SVC-enabled application 100 at each end-point sends a request to establish a SVC connection to its respective network service agent 102 , which resides in the subscriber's computer 10 or the ATU-R 12 .
  • the request includes the source username, destination username, class of service, bandwidth, shared session key, and IP routing/mapping information.
  • the network service agent 102 can be located on either the client PC 10 or the ATU-R 12 . In the bridge mode, the network service agent 102 resides on the subscriber's system 10 and in the router mode it resides on the subscriber's ATU-R 12 .
  • the network service agent 102 handles network layer connection duties, including managing an API interface between the ATU-R 12 and the subscriber 10 .
  • the network service agent 102 also manages the routing tables as well as session establishment and termination. In addition, the network service agent 102 executes packet filtering rules.
  • the network service agent 102 includes two input APIs: (1) an HTTP or command line API, e.g., a Telnet based configuration suitable for direct human interaction, and (2) a socket based API for process to process communications.
  • Users or applications which are clients of the network service agent 102 , can send CONNECT, DISCONNECT, STATUS, and REACHABILITY requests to the connection server 104 via the network service agent 102 and the secure connection between the network service agent 102 and the connection server 104 .
  • Return information from client requests should be explicitly output to the user in the case of the human readable interface.
  • return information can be returned via the socket connection between the client process 100 and network service agent 102 .
  • the client process 100 should be able to poll status information via the network service agent 102 to self determine the result of requests.
  • the layer 3 and layer 4 information associated with the SVC flow must be communicated by the application or user to the network service agent 102 as part of the CONNECT request. Only the information relevant to layer 2 provisioning is passed on to the connection server 104 for the SVC portion of the connection establishment.
  • Output APIs are also provided in the network service agent 102 .
  • the network service agent 102 In the bridge mode, the network service agent 102 (residing in the client 10 ) manipulates the static policy routing tables in the client 10 and the mapping filter function in the ATU-R 12 .
  • the network service agent 102 In the router mode, the network service agent 102 (residing in the ATU-R 12 ) manipulates the policy routing tables and mapping filter function of the ATU-R 12 .
  • the client 10 uses the ATU-R 12 as the default layer 3 gateway and does not require additional configuration.
  • the network service agent 102 is responsible for establishing a secure connection to the connection server 104 , providing authentication information to the connection server 104 , and authenticating the identity of the connection server 104 .
  • the network service agent 102 is also responsible for handling client requests by working with the connection server 104 , over the network service agent 102 /connection server 104 secure channel, to establish and tear down SVC connections and to poll current status information.
  • the network service agent 102 re-configures routing and mapping tables in the client 10 and/or ATU-R 12 to maintain appropriate routing of client traffic.
  • Each network service agent (local and remote) 102 will, on-demand, establish a secure channel to the connection server 104 over the best effort PPPoE channel.
  • the network service agent 102 also authenticates each user to determine whether the user is authorized to establish SVCs.
  • the connection server 104 authenticates the management session and responds to connection setup requests, connection tear down requests, connection status polls, and reachability inquiries.
  • connection server 104 to service a connection setup request, receives matching connection requests from both network service agents 102 within a time-out window.
  • the connection requests should have matching attribute elements.
  • the connection server 102 can receive a request from only one of the network service agents 102 .
  • the connection server 104 may respond to connection status polls with status messages indicating the SVCs in use, class of service, bandwidth, session keys, etc.
  • the connection server 104 may also send asynchronous status updates to the network service agents 102 upon connection and/or disconnection.
  • connection server 104 communicates with the proxy signaling agent 106 to accomplish the requested provisioning task.
  • the proxy signaling agent 106 signals the network elements to provision the SVC.
  • the SVC status is passed back to the connection server 104 and to the network service agent 102 .
  • each network service agent 102 After receiving verification of SVC setup, each network service agent 102 changes policy routing tables in the PC 10 or ATU-R 12 , in bridge and routing modes, respectively; changes mapping functions in the ATU-R 12 ; and informs the requesting subscriber SVC-enabled application 100 that the SVC channel has been configured.
  • the mapping functions in the ATU-R 12 include the rules that the ATU-R 12 should use for filtering each packet and directing the packet into a specific PVC that connects to the SVC. As discussed above, the mapping function is dynamically established to correspond to the SVC session duration.
  • Informing the application 100 that the SVC channel has been configured may be accomplished in a session established between the subscriber SVC-enabled application 100 and the network service agent 102 .
  • the subscriber SVC-enabled application 100 may simply poll the network service agent 102 for connection status to self determine success or failure.
  • the SVC may be deactivated by either: (1) the subscriber SVC-enabled application 100 sending a disconnect request to the connection server 104 via its network service agent 102 , (2) termination of the connection server 104 to network service agent 102 management channel (either explicit or time-out), or (3) a network event such as re-routing or other failure.
  • a network event occurs, the SVC status is known by the proxy signaling agent 106 and communicated to the connection server 104 .
  • the connection server 104 informs both sides that the SVC has been cleared. In the event of a disconnect request or termination of the management channel, the connection server 104 informs the non-disconnected side that the SVC has been cleared.
  • the network service agent 102 modifies the policy routing and mapping tables in the client device 10 and/or ATU-R 12 to reflect the change in connectivity.
  • a CONNECT request should include the following parameters: source subscriber, destination subscriber, class of service, bandwidth, and session key. In order to process the CONNECT request, matching CONNECT requests should be received from both the source subscriber and the destination subscriber within a time-out period.
  • the connection server 104 processes validated CONNECT requests by querying the LDAP 30 to determine required provisioning information, such as AESAs, available PVC identifiers at each end-point, etc.
  • the connection server 104 also selects suitable PVC identifiers, class of service, and traffic descriptors, and performs CAC functions for ATU-R and DSLAM ports based on real time SVC tracking information and port speeds obtained from the LDAP 30 .
  • the connection server 104 services validated CONNECT requests by passing provisioning information to the proxy signaling agent 106 .
  • connection server 104 Upon being notified by the proxy signaling agent 106 of successful provisioning or failure to provision, the connection server 104 updates its internal real time SVC session tracking information.
  • the provisioning result may be communicated to the calling network service agents 102 by an explicit response to the CONNECT request and/or waiting for the network service agent 102 to inquire about the current SVC status information (polling).
  • a DISCONNECT request should include the following parameters: source subscriber, destination subscriber, class of service, bandwidth, and session key.
  • a DISCONNECT request is determined to be valid when it is received from one or both network service agents 102 and it matches an existing, previously established SVC connection.
  • the connection server 104 services valid DISCONNECT requests by matching the DISCONNECT request with its real time SVC tracking table, and communicating stored information to the proxy signaling agent 106 to clear the SVC.
  • connection server 104 Upon provisioning success or failure, communicated by the proxy signaling agent 106 , the connection server 104 updates its internal real time SVC session tracking information. The provisioning result may be communicated to the calling network service agent 102 by an explicit response to the DISCONNECT request and/or waiting for the network service agent 102 to inquire about the current SVC status information (polling).
  • a STATUS request requires no parameters.
  • the connection server 104 simply updates the requesting network service agent 102 with the status of all SVCs terminated by the ATU-R 12 managed by the network service agent 102 .
  • a REACHABILITY request requires a destination subscriber parameter.
  • the connection server 104 informs the querying network service agent 102 of whether the destination subscriber is reachable, via SVC, from the source subscriber 10 .
  • the response to the request only confirms that source to destination connectivity is possible, and it does not take into account available bandwidth, etc.
  • Each network service agent 102 connects to the connection server 104 to initiate SVC connections. This network service agent 102 to connection server 104 connection is made over the public Internet, and it must be authenticated and secure.
  • any SVCs established by the network service agent's username is automatically released by the connection server 104 .
  • all SVCs established under the username must be released automatically once the final network service agent 102 to connection server 104 connection is dropped or times out. Time outs may be determined using an explicit keep-alive mechanism if this is not provided by the secure encryption layer.
  • An advantage of the proxy signaling approach, described above, is that such an approach does not require SVC capability for ATU-Rs or for DSLAMs. If the ATU-R does have SVC capability, and DSLAM does not support SVC, another approach may be employed. Such an approach will be referred to as Extended Virtual UNI.
  • Extended Virtual UNI enables an SVC to be set up between an originating ATU-R and a destination ATU-R, through the ATM network, using an established range of VCs within a single VP.
  • Virtual UNI e.g., ATM Forum UNI 4 . 0
  • Each Virtual UNI requires the use of one VP, a limited number of which are available at each port of the DSLAM and at the ATM switch. Therefore, use of Virtual UNI to enable SVCs between the ATU-R and the ATM switch is unacceptably restrictive and impractical.
  • each VP (identified by a corresponding VPI) is segmented into a number of VC ranges, consisting of multiple, contiguous VCs (identified by corresponding VCI address ranges).
  • Each of the VC ranges accommodates a Virtual UNI, greatly increasing the capacity of each VP to support multiple Virtual UNIs.
  • a VC range includes at least one VC dedicated to control and at least one VC dedicated to data.
  • the control VCs include a signaling channel, which enables setting up and tearing down the SVCs.
  • the control VC and the signaling channel may be one in the same. However, when there are multiple contiguous control VCs, only one VC need be dedicated to signaling.
  • the remaining control VCs may support additional control information, such as interim local management interface (ILMI) data, for example.
  • ILMI interim local management interface
  • FIG. 4 is a table indicating an exemplary VPI/VCI arrangement for Extended Virtual UNI, in which sixteen VPs are segmented to support over 3000 Virtual UNIs by segmenting each VP into multiple sets of five contiguous VCs, indicated by the corresponding VCIs.
  • FIG. 4 shows an embodiment in which the number of VCs for each VP for each Virtual UNI is set at five, it is understood that the number of VCs may be any subset of contiguous VCs within the corresponding VP, without departing from the scope and spirit of the present invention.
  • the first column of FIG. 4 indicates the virtual path connection index (VPCI) that identifies the Virtual UNI corresponding to the range of VCs within a particular VP.
  • VPCI virtual path connection index
  • Each VP is segmented into 198 VCI ranges, corresponding to 198 Virtual UNIs. Therefore, according to the depicted embodiment, a total of 3168 Virtual UNIs are accommodated through one port of the ATM edge switch.
  • the second column of FIG. 4 identifies the VPI/VCI range in each of the sixteen VPs.
  • each VCI address range has been predetermined to include five VCs in the present example.
  • VPCI number 1 is established through VCIs 32 to 36 of VPI number 1
  • VPCI number 396 is established through VCIs 1022 to 1026 of VPI number 2 .
  • the first Virtual UNI is shown to begin at VCI 32 because VCIs 0 - 31 within each VPI are typically reserved for signaling data.
  • the relationship between the range of VCIs and the number of the Virtual UNI is indicated generally in the row corresponding to VPCI n+1.
  • the VCI range for VPCI n+1 extends from 32 +(5*n) to 36+(5*n).
  • the third column of FIG. 4 identifies the control channel for each VPCI.
  • the control channel carries the signaling that enables connection setup, identification of network elements and clients, and the like.
  • at least one control channel in a VC range must be dedicated to transmitting signaling relating to the network, although additional control channels may accommodate addition types of control data.
  • each VC range includes one control channel (e.g., assigned to the first VC of each VC range).
  • the control channel of VPCI number 1 is VCI 32 within VPI 1 (i.e., 1/32)
  • the control channel of VPCI number 3168 is VCI 1022 within VPI 16 .
  • Extended Virtual UNI is implemented in a packet based communications network, such as the ATM network depicted in FIG. 6.
  • FIG. 6 depicts various network elements generally similar to those described above with respect to FIG. 1, to the extent the reference numerals correspond.
  • Implementation of Extended Virtual UNI requires software enhancements to various network elements, including the ATU-R 12 , the DSLAM 14 and the ATM switch 15 .
  • the enhanced ATU-R 12 supports ATM Forum UNI 3 . 1 , UNI 4 . 0 and ILMI.
  • An API to a network service agent such as the network service agent 102 of FIG. 2, is included to enable SVC initiation.
  • the ATU-R 12 also includes decode/encode capability up to layer 4 (e.g., TCP/JDP) for the routed mode.
  • the enhanced ATU-R 12 also requires policy-based routing, enabling packets to be forwarded on different VCs (e.g., based on L1-L4 information), and VC based queuing, scheduling and shaping, enabling forwarded traffic to conform to the SVC parameters.
  • the DSLAM 14 is pre-configured with cross-connect PVCs, which map the signaling channel's VPI/VCI address and the data channels' VPI/VCI addresses in the UNI of the ATU-R 12 to Extended Virtual UNI addresses in the ATM switch 15 .
  • the cross-connect PVCs in the DSLAM 14 may be pre-configured to map ATU-R 12 UNI addresses to Extended Virtual UNI addresses as follows: The UNI signaling channel is mapped from VPI/VCI 0 / 5 to VPI/VCI 3 / 60 ; the CBR channel is mapped from VPI/VCI 0 / 32 to VPI/VCI 3 / 61 ; the VBR-rt is mapped from VPI/VCI 0 / 40 to VPI/VCI 3 / 62 ; and the VBR-nrt is mapped from VPI/VCI 0 / 48 to VPI/VCI 3 / 63 . Consistent with the invention, the VPI/VCIs of the Extended Virtual UNI indicate contiguous VCs within the same VP.
  • the ATM switch 15 is configured to support Extended Virtual UNI. Also, additional levels of CAC are required for traffic management of the DSLAM trunk port congestion point and customer service control, including Logical Port (UNI) Level CAC, Extended Virtual UNI Level CAC, and per connection level CAC.
  • the connection level CAC enables the SVC call request to be matched to a pre-provisioned PVC in the DSLAM 14 .
  • the ATM switch 15 stores the following information in relation to each Extended Virtual UNI: a service-active identifier, which is set upon subscription to the service; a VPI/VCI range, identifying the VP and the range of contiguous VCs within the VP; a maximum equivalent bandwidth and an available bandwidth; and information regarding the PVCs pre-configured in the DSLAM 14 .
  • the PVC information includes, for example, the VPI/VCI of the Extended Virtual UNI, the VPI/VCI of the ATU-R 12 UNI, the service category (e.g., CBR, VBR-rt, VBR-nrt, UBR), traffic descriptors (e.g., PCR, SCR, MBS), QoS parameters (cell loss rate, latency, jitter), and the status of the connection (e.g., busy, free).
  • the service category e.g., CBR, VBR-rt, VBR-nrt, UBR
  • traffic descriptors e.g., PCR, SCR, MBS
  • QoS parameters cell loss rate, latency, jitter
  • the status of the connection e.g., busy, free.
  • an element management system (EMS)/provisioning server 27 servicing the ATM network 16 is also included.
  • the EMS/provisioning server 27 supports SVC call based billing functions, such as usage based accounting.
  • the EMS/provisioning server 27 is also enhanced to support configuration of Extended Virtual UNI in the edge switches, such as the ATM switches 15 and 19 .
  • FIG. 5 is an exemplary call flow diagram showing an SVC established through the ATM network 16 , using Extended Virtual UNI, between the source subscriber 10 and the destination subscriber 40 .
  • the request to setup the SVC is initiated by the source subscriber 10 .
  • the source subscriber 10 initially contacts the ISP 24 via the Internet 20 (not pictured in FIG. 5) at step 510 .
  • the source subscriber 10 identifies the destination subscriber 40 , for example, by providing an associated IP address to the ISP 24 .
  • the subscriber 10 queries a database through the ISP 24 , such as the LDAP 30 , to retrieve the AESA of the ATU-R 42 , corresponding to the destination subscriber 40 , based on the IP address provided by the source subscriber 10 at step 510 .
  • the LDAP 30 performs a lookup of the AESA and replies with the AESA of the ATU-R 42 at step 512 , which is forwarded to the source subscriber 10 at step 513 .
  • the source subscriber 10 identifies the AESA of the ATU-R 42 in any appropriate manner, without departing form the scope and spirit of the present invention.
  • the source subscriber 10 may maintain a pre-established database of AESAs for commonly connected destinations.
  • the AESA may be retrieved from an instant messaging server.
  • the source subscriber 10 initiates a connection with the ATM network 16 by sending a signaling message, such as a setup connection request, to the ATU-R 12 at step 514 .
  • the QoS application sends a QoS connection setup message through the API to the ATU-R.
  • the setup message carries the service category, the traffic descriptors and the QoS parameter, described above.
  • the QoS application sends the QoS connection setup message through the API to a network service agent (not pictured in FIG. 5), such as the network service agent 102 of FIG. 2.
  • the network service agent translates the connection setup message and forwards it to an SVC signaling entity in the ATU-R 12 .
  • the signaling message also includes the AESA of the destination subscriber 40 , as well as the QoS requirement for supporting the underlying application.
  • the ATU-R 12 Upon receipt of the connection setup request, the ATU-R 12 sends a standard SVC SETUP message over a standard UNI signaling channel, transparently through the DSLAM 14 , to the Extended Virtual UNI of the ATM switch 15 at steps 515 and 516 .
  • the standard UNI signaling channel is cross-connected by DSLAM 14 to the first channel (or first set of contiguous control channels) of the Extended Virtual UNI in the ATM switch 15 .
  • the first channel is, by default, the signaling channel of the Extended Virtual UNI.
  • the SETUP message likewise includes the AESA of the destination subscriber 40 and the QoS requirement.
  • a SETUP message is received on a VC having a VPI/VCI of 1 / 37 , the UNI is mapped to the Extended Virtual UNI corresponding to VPCI number 2 (VPI INCIs 37 - 41 ).
  • the ATM switch 15 When the ATM switch 15 receives the SETUP message, it initially determines whether the requested connection is authorized and the requested service is available. The ATM switch 15 then performs various CAC functions, discussed above. For example, the ATM switch 15 performs a standard ATM UNI CAC and an Extended Virtual UNI CAC to determine whether there is enough available or equivalent bandwidth to accommodate the new connection. If not, the ATM switch 15 sends a reject message back to ATU-R 12 , indicating the reason for failure as not enough network resources.
  • the ATM switch 15 also performs a connection CAC to determine whether any of the pre-configured PVCs in the DSLAM 14 for this subscriber can satisfy the requirement of the connection based on traffic descriptors and QoS requirements. If not, it sends a reject message back to ATU-R 12 with the reason for failure as not enough network resources. If the pre-configured PVCs can satisfy the requirement, the ATM switch 15 selects a PVC with the lowest service category and lowest bandwidth from all of the PVCs that satisfy the requirement and extracts the necessary data associated with the selected PVC, including VPI/VCI in the Virtual Extended UNI, corresponding VPI/VCI in ATU-R UNI.
  • the ATM switch 15 then initiates a standard SVC connection setup procedure. For example, the ATM switch responds to the ATU-R 12 with a CALL-PROCEED message at step 517 to indicate initiation of the requested connection at the QoS requirement. The message informs the ATU-R 12 which VPI/VCI should be used for this connection.
  • the ATM switch 15 sends the SETUP message to the terminating edge switch, ATM switch 19 , through the ATM network 16 (not pictured in FIG. 5).
  • the message may be routed directly to the ATM switch 19 , or may pass through any number of intervening switches, depending on the layout of the ATM network 16 . All transit (i.e., non-terminating) ATM switches treat the call as a standard SVC call.
  • the ATM switch 19 When the ATM switch 19 receives the SETUP message, it performs the same CACs as the ATM switch 15 , described above, to check whether there are enough network resources to accommodate this connection. When any of the CAC checks fail, a standard release message is returned to the ATM switch 15 . When all of the CAC checks are passed, the ATM switch 19 selects a PVC with the lowest service category and lowest bandwidth from the PVCs that satisfy the requirement, in the manner discussed above. The ATM switch 19 extracts the necessary data associated with the PVC, including VPI/VCI in the Virtual Extended UNI, corresponding VPI/VCI in the UNI of the ATU-R 42 .
  • the ATM switch 19 sends the SETUP message to the ATU-R 42 , via the DSLAM 44 , at steps 519 and 520 , specifying the VPI/VCI in the SETUP message that ATU-R 42 UNI should use for the connection.
  • the ATU-R 42 sends a CALL-PROCEED message to the ATM switch 19 at step 521 (via the DSLAM 44 ) to indicate initiation of the requested connection.
  • the ATU-R 42 sends a CONNECT message (via the DSLAM 44 ), indicating that it has accepted the call.
  • the ATM switch 19 returns a CONNECT-ACKNOWLEDGE message to the ATU-R 42 at step 523 (via the DSLAM 44 ) and sends a CONNECT message to the ATM switch 15 at step 524 through the ATM network 16 .
  • the ATM switch 15 likewise sends a CONNECT message to the ATU-R 12 at step 525 (via the DSLAM 14 ), utilizing the established Extended Virtual UNI. For example, when the Virtual UNI is VPCI number 2 (indicated by FIG. 4), the CONNECT message passes to the ATU-R 12 via the VC identified by VPI/VCI 1 / 37 .
  • a CONNECT-ACKNOWLEDGE message is returned to the ATM switch 15 at step 526 (via the DSLAM 14 ). The resulting SVC connection is indicated by the dashed line at step 527 .
  • the ATU-R 12 acknowledges to the source subscriber 10 that the SVC has been set up at step 528 .
  • each of the ATU-R 12 and the ATU-R 42 informs its respective network service agent (not pictured in FIG. 5) to add a specific policy routing entry into its routing table (e.g., in the corresponding PC for the bridge mode and in the ATU-R for the routed mode).
  • the calling end network service agent informs the corresponding application that the QoS connection is ready for use.
  • the source subscriber 10 sends a request to use the SVC to the ATU-R 12 at step 529 .
  • the request includes, for example, the IP address and port address of the destination subscriber 40 , the protocol ID and the QoS.
  • the connection between the source subscriber 10 and the destination source 40 , including the SVC, is indicated by step 530 .
  • the signaling and data passed over the SVC is mapped to the VPI/VCIs of the Extended Virtual UNI as established during the connection setup.
  • the application sends a message through network service agent to the ATU-R 12 to release the QoS connection.
  • the ATU-R 12 sends a standard release message to the ATM switch 15 and deletes the corresponding policy routing entry in the routing table.
  • the ATM switch 15 performs standard SVC release actions and, at the same time, releases the occupied PVC.
  • the ATM switch 15 accordingly adds the equivalent bandwidth of the connection back to the available bandwidth of the Extended Virtual UNI and the available bandwidth of the DSLAM trunk port.
  • the ATU-R 42 When the ATU-R 42 receives the release message, it likewise deletes the corresponding policy routing entry in the routing table, and responds with a standard UNI signaling message (e.g., a RELEASE COMPLETE message) to the ATM switch 19 .
  • a standard UNI signaling message e.g., a RELEASE COMPLETE message
  • the ATM switch 19 When the ATM switch 19 receives the RELEASE COMPLETE message, it performs the same actions as the ATM switch 15 , releasing the utilized resources.
  • the provisioning, control and billing of the Extended Virtual UNI service may be implemented by known methods.
  • the ATM edge switches are the service provisioning and control points. Therefore, customers, who signal SVC connection requests without ordering peer to peer QoS services, receive no response to the UNI signaling since a service active identifier is not initially set in the corresponding ATM switch.
  • service related data is configured through the EMS/provisioning server 27 , discussed above, into the corresponding ATM edge switch.
  • Extended Virtual UNI based CAC functions limit the actual allocated equivalent bandwidth, to avoid exceeding the maximum equivalent bandwidth for the Extended Virtual UNI. Policing may be imposed on each connection based on the traffic descriptors. Billing likewise may be based on traffic descriptors, as well as service categories, duration and traffic usage.
  • the ATM switch 15 is able to support the SVC between the ATU-R 10 and the ARU-R 42 without having to dedicate an entire VP to that single SVC.
  • the ATM switch is able to meet the QoS requirements and still support additional Virtual UNIs through the same VP, more efficiently utilizing the VCs within one VP.
  • multiple subscribers can connect to the ATM network 16 and set up SVCs using respective Virtual UNIs, corresponding to distinct ranges of contiguous VCs within a single VP. Consequently, additional SVCs are enabled through the network, guaranteeing QoS for specific end user applications, without having to expand the physical port capacity of various network elements.
  • the methods described herein are intended for operation as software programs running on a computer processor.
  • Dedicated hardware implementations including, but not limited to, application specific integrated circuits, programmable logic arrays and other hardware devices can likewise be constructed to implement the methods described herein.
  • alternative software implementations including, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein.
  • a tangible storage medium such as: a magnetic medium, e.g., a disk or tape; a magneto-optical or optical medium such as a disk; or a solid state medium such as a memory card or other package that houses one or more read-only (non-volatile) memories, random access memories, or other re-writable (volatile) memories.
  • a digital file attachment to email or other self contained information archive or set of archives is considered a distribution medium equivalent to a tangible storage medium. Accordingly, the invention is considered to include a tangible storage medium or distribution medium, as listed herein and including art-recognized equivalents and successor media, in which the software implementations herein are stored.

Abstract

An SVC is established via an ATM switch port, which includes multiple virtual paths (VPs), by associating multiple virtual user-to-network interfaces (UNIs) to each of the VPs. Each of the VPs includes multiple virtual circuit (VC) ranges, each of which corresponds to a different virtual UNI. Each VC range includes at least one VC for control and at least one VC for data transfer. Associating the virtual UNIs to each of the VPs includes mapping each virtual UNI to a corresponding VC range within a VP based on a virtual path index (VPI)/virtual channel index (VCI) of the virtual UNI initially received by the ATM switch port.

Description

  • This application is related to U.S. patent application Ser. No. 10/286,786, filed Nov. 4, 2002, entitled “Peer to Peer SVC-Based DSL Service,” in the names of Wenge CHEN et al., the disclosure of which is expressly incorporated by reference herein in its entirety.[0001]
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0002]
  • The present invention relates to the field of communications. More particularly, the present invention relates to dynamically establishing broadband quality of service (QoS) connections, on demand, between peers on a network to guarantee application specific IP QoS via the combination of ATM switched virtual connections (SVCs) and permanent virtual connection (PVCs). Alternative processes are disclosed, including (i) dynamically establishing an SVC shortcut connection from a peer device using an SVC signaling proxy device without going through an ISP, and (ii) creating multiple virtual user-to-network interfaces (UNIs) within a single virtual path (VP) at each port of an ATM edge switch to establish SVCs between subscribers. [0003]
  • 2. Background Information [0004]
  • Network carriers are currently providing broadband access services to a large number of subscribers using asynchronous transfer mode (ATM) and digital subscriber lines (DSL). Under the current paradigm, subscribers connect to an Internet service provider (ISP) using a pre-existing static point-to-point or “nailed up” connection, e.g., a PVC. Once the connection has been established the subscriber can communicate to the ISP, via the connection, using various bridge or router modes. In the case of bridge mode, typically point-to-point protocol (PPP) or point-to-point protocol over Ethernet (PPPoE) is used to set up the user sessions and carry the user IP packets to the ISP. When a subscriber wishes to communicate with a peer subscriber, all communications via IP packets travel through the ISP, thus suffering implementation complexity and operational unfeasibility for supporting application specific QoS. [0005]
  • Furthermore, subscribers currently interface with the ATM network over PVCs via standard UNIs. To support on-demand, SVC-based connections, each customer must be able to dynamically signal connection establishment requests to the ATM network. If both ATU-R and ATM switch support SVC, but the DSLAM does not, the current virtual UNI-based implementations suffer from scalability limitations. For example, using a single UNI supports only a single customer because one signaling channel exists for the entire UNI. Using virtual UNIs expands the limit to 256 customers because virtual UNIs sub-divide the UNI into a maximum of 256 virtual UNIs, each having a unique Virtual Path Identifier (VPI). However, a single virtual UNI, which supports ATM network access of a single subscriber, requires an entire VP, even though most of the virtual channels (VCs) within the VP are not needed to support the SVC. A limited number of VPs are available at each port of an ATM edge switch and/or a digital subscriber line access multiplexer (DSLAM) connected to the ATM edge switch, which accordingly restricts the number of UNIs that may be supported by the network at any one time. For example, a DS3 or a OC3 port typically accommodates at most 256 VPIs, thereby limiting each port to support of 256 virtual UNIs, even though a DSLAM may service thousands of subscribers. [0006]
  • It is desirable to have a system that enables each VP to support multiple UNIs, expanding the ATM network's capability to support guaranteed QoS connections, without having to increase the number of physical ports of various network elements.[0007]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present invention is further described in the detailed description that follows, by reference to the noted drawings by way of non-limiting examples of embodiments of the present invention, in which like reference numerals represent similar parts throughout several views of the drawings, and in which: [0008]
  • FIG. 1 is a block diagram showing an exemplary network architecture for proxy signaling, according to an aspect of the present invention; [0009]
  • FIG. 2 is a block diagram illustrating an exemplary relationship between logical components of proxy signaling, according to an aspect of the present invention; [0010]
  • FIG. 3 is a block diagram showing an exemplary network architecture for proxy signaling, according to another embodiment of the present invention; [0011]
  • FIG. 4 is a table showing an exemplary VPI/VCI arrangement for Extended Virtual UNI, according to an aspect of the present invention; [0012]
  • FIG. 5 is an exemplary call flow diagram showing an SVC being set up using Extended Virtual UNI, according to an aspect of the present invention; and [0013]
  • FIG. 6 is a block diagram showing an exemplary network architecture for Extended Virtual UNI, according to an aspect of the present invention.[0014]
  • DETAILED DESCRIPTION OF EMBODIMENTS
  • The present invention relates to establishing broadband QoS connections between peers on an ATM network to guarantee application specific IP QoS, through SVCs and PVCs. When an ATU-R does not have SVC capability, an SVC may be dynamically established by a proxy signaling alternative, discussed below. When the peer device has SVC capability, an SVC may be efficiently established through one of many UNIs set up within a single VP at each port of an ATM edge switch, referred to as Extended Virtual UNI. [0015]
  • In view of the above, the present invention, relating to Extended Virtual UNI, through one or more of its various aspects and/or embodiments is presented to accomplish one or more objectives and advantages, such as those noted below. [0016]
  • An aspect of the present invention provides a method for establishing at least one SVC through an ATM switch port, which includes multiple VPs, by associating multiple virtual UNIs to each of the VPs. Each VP includes multiple VC ranges, each of which corresponds to a different virtual UNI. Also, each VC range includes at least one VC for control and at least one VC for data transfer. Associating the virtual UNIs to each of the VPs of the ATM switch port may include mapping each virtual UNI to a corresponding VC range within a VP based on a VPI/VCI of the virtual UNI initially received by the ATM switch port. [0017]
  • Another aspect of the present invention provides a method for supporting multiple virtual UNIs within a single VP, which includes multiple VCs. The method includes assigning a virtual UNI to the VP, and assigning at least one control VC and at least one data VC of the VP to the virtual UNI, such that the at least one data VC is contiguous with the at least one control VC. Multiple virtual UNIs are thus available for the VP. A QoS may be associated with an application of the virtual UNI. At least one of the control and data VCs are then assigned based on the QoS. [0018]
  • A minimum number of contiguous data VCs needed to support the QoS may be determined. The determined number of data VCs is assigned to the virtual UNI. Likewise, a minimum number of contiguous control VCs needed to support the QoS may be determined. The determined number of control VCs is assigned to the virtual UNI. One of the at least one control VCs is a signaling channel. The minimum number of data VCs or control VCs may be as few as one VC. [0019]
  • Another aspect of the present invention provides a method for establishing an SVC in an ATM network by receiving a signaling message, via a virtual UNI, to set up the SVC, and assigning the virtual UNI to a range of VCs within a single VP based on a VPI/VCI of the signaling message. The VP includes at least one additional range of VCs assigned to another virtual UNI. The SVC is then established using the range of VCs assigned to the virtual UNI. [0020]
  • Another aspect of the present invention provides a system for establishing at least one SVC in an ATM network, including an ATM network element having multiple ports, each of which supports multiple VPs. The ATM network element may include an ATM edge switch or a DSLAM. The ATM network element associates multiple virtual UNIs to each of the VPs. Each VP includes multiple VC ranges, each of which corresponds to a different virtual UNI of the mulitple virtual UNIs. Each VC range includes at least one VC for control, including signaling, and at least one VC for data transfer. The ATM network element may associate the virtual UNI's to each VP by mapping each virtual UNI to a corresponding VC range within the VP, based on a VPI/VCI of the virtual UNI initially received at a corresponding port. [0021]
  • Yet another aspect of the present invention provides a computer readable medium for storing a computer program that establishes at least one SVC by way of an ATM switch port, which includes multiple VPs. The computer readable medium includes an associating source code segment that associates multiple virtual UNIs to each of the VPs. Each VP includes multiple VC ranges, each of which corresponds to a different virtual UNI of the multiple virtual UNIs. Also, each VC range includes at least one VC for control and at least one VC for data transfer. [0022]
  • The computer readable medium may further include a mapping source code segment that maps each virtual UNI to a corresponding VC range within a VP based on a VPI/VCI of the virtual UNI initially received by the ATM switch port. The associating source code segment associates the multiple virtual UNIs to each of the VPs based on the mapping. The computer readable medium may also include a determining source code segment that determines a size of each VC range based on an application of the corresponding virtual UNI. [0023]
  • The various aspects and embodiments of the present invention are described in detail below. [0024]
  • 1. Proxy Signaling
  • FIG. 1 is a block diagram depicting an exemplary network infrastructure in which the present invention operates, as it relates to proxy signaling. A source subscriber's [0025] computer 10 is connected to a DSL ATU-R 12 at the subscriber's premises. Although the subscriber's computer is referred to as a PC in the following description, the computer is not limited to a personal computer. Rather the subscriber's computer (also referred to as a client) can be any device capable of communicating to an ISP.
  • An exemplary DSL ATU-R is the SpeedStream 5360 DSL Model, available from Efficient Networks, Inc. of Dallas Tex. The DSL ATU-[0026] R 12 connects to a DSLAM 14 using a pre-existing digital subscriber line. The DSLAM 14 is connected to a high speed network, e.g., an ATM network 16. The DSLAM 14 connects to an ATM edge switch 15, which operates as a gateway into the ATM network 16. Although the following description refers only to ATM, any connection-oriented network that supports equivalent QoS can be substituted for the ATM network 16.
  • The [0027] ATM network 16 includes a number of ATM switches 15, 17, 19. Exemplary switches include the Alcatel 7670 Routing Switch Platform, available from Compagnie Financière Alcatel of Paris, France. An exemplary DSLAM 14 is the Alcatel 7300 Advanced Services Access Manager, available from Compagnie Financière Alcatel of Paris, France.
  • An [0028] edge ATM switch 17 of the ATM network 16 connects via the Internet 20 to a service provider's broadband remote access server (B-RAS) 22. The B-RAS 22 terminates PPP connections for each DSL subscriber 10. An exemplary B-RAS 22 is an SMS 1800, available from Redback Networks Inc. of San Jose, Calif. The B-RAS 22 connects to the Internet service provider 24. The connection to the Internet service provider (ISP) 24 is via a local connection, such as an Ethernet connection.
  • Typically the connection from the [0029] subscriber 10 to the B-RAS 22 is pre-provisioned and it will be referred to as a signaling connection or a control connection. In one embodiment, the control connection is a manually configured PVC though which a PPP session is established.
  • According to an aspect of the present invention, the [0030] subscriber 10 can dynamically select a peer device, such as the destination subscriber device 40, to communicate with and can request QoS connections to the peer device by communicating over the control connection. In one embodiment, the QoS connection to the peer device 40 is a dynamically established SVC 50. Although the description refers to an SVC as the QoS connection, it is noted that an SVC is merely a non-limiting example of a QoS connection; and another type of QoS connection, such as Soft Permanent Virtual Circuit (SPVC), can be used instead of an SVC without departing from the scope and spirit of the present invention. An example of when a subscriber 10 might desire such a QoS connection is when the subscriber 10 desires to engage in a video conference with another subscriber 40.
  • In order to dynamically establish the [0031] SVC 50, the subscriber 10 transmits a connection setup request to the connection server 25. In the following description, subscriber refers to the combination of the client and an associated network service agent. The client communicates to the connection server 25 via an API to a software component, the network service agent, which is located on the client (bridge model) or ATU-R (routed model). The request, originating from the subscriber 10 is transmitted to the connection server 25 over the subscriber's best effort connection to the ISP 24. The request includes information about the SVC 50 (or SVCs, each being associated with a different application) to be setup, including the destination subscriber 40, a shared session key agreed upon by subscriber 10 and subscriber 40, a class of service of the SVC 50, and a traffic descriptor of the SVC 50. The class of service can be, for example, constant bit rate (CBR) or variable bit rate (VBR). The traffic descriptor describes the requested bandwidth in terms of ATM standard traffic descriptors, e.g., by sustained cell rate (SCR), peak cell rate (PCR), and maximum burst size (MBS).
  • The [0032] connection server 25 then queries an LDAP 30 for information about the subscriber 10 and the subscriber 40. The LDAP 30 receives such subscriber information, and information about the network as part of the provisioning process flow. Exemplary subscriber and network information includes the following information for both subscriber 10/switch 15 and subscriber 40/switch 19: the switch identifier of the switch 1 (possibly an IP address or switch specific proprietary address); the physical port number and the logical port number; end system addresses, e.g., ATM end system address (AESA), of source and destination UNIs; a set of VPI/VCIs at the source UNI and a set of VPI/VCIs at the destination UNI; and an address (e.g., an IP address) of a proxy signaling agent (PSA) 35. The LDAP 30 also stores some other network related information, such as up-link port speeds and DSL synchronization rates needed for the connection server to calculate total available bandwidths and perform the CAC function for ATU-R and DSLAM ports.
  • Authorization and authentication information can also be retrieved from a [0033] RADIUS server 28, if necessary. In addition, accounting records can be stored on the RADIUS server 28. The RADIUS server 28 is provisioned with the user authentication information (username and password) as part of the customer management flow.
  • In one embodiment, the [0034] destination subscriber 40 must also perform the previously described actions by requesting a connection to the source subscriber 10 with identical parameters after the subscriber 40 receives the application session setup message from subscribe 10 through the best effort connection. By receiving connection requests from both subscribers 10, 40 within a time-out period, the connection server 25 considers the connection request to be both originated and accepted by both subscribers 10, 40.
  • After the necessary information, such as the AESAs, VPI/VCIs, class of service, and bandwidth, etc., is obtained from the [0035] LDAP 30 and the RADIUS server 28, the connection server 25 performs a call admission control (CAC) step to determine if sufficient available bandwidth exists in the ATU-Rs and DSLAMs to accommodate the connection request. The connection server 25 maintains state information of the currently available bandwidth at each subscriber's ATU-R and related DSLAM up-links. If sufficient bandwidth is available, then the connection server 25 sends the SVC request and the necessary information to a proxy signaling agent 35. The proxy signaling agent 35 is responsible for performing the SVC signaling and relaying results and status information from the network elements to the connection server 25. That is, the proxy signaling server 35 communicates with the SVC capable ATM network 16 to establish, to tear down, and to obtain the status of SVC connections, and to obtain information about resource availability.
  • After receiving the necessary information, the [0036] proxy signaling agent 35 communicates with the requesting subscriber's edge switch 15 to initiate an SVC 50 to the destination subscriber's edge switch 19. The proxy signaling agent 35 informs the edge switch 15 of the destination switch address and then the SVC 50 is set up in the standard manner.
  • Once the [0037] SVC 50 is set up, the proxy signaling agent 35 informs the connection server 25, then the connection server 25 sends a message to both subscribers, specifically the network service agent associated with each client, informing them of the successful connection establishment. Then the routing tables are updated in both subscribers' PCs (for bridge mode) or ATU-Rs (for router mode) so that QoS application packets can be sent over the new QoS connection. In the bridge mode, a packet mapping table is also modified in the ATU-R. As is well known, every PC has a routing table to provide the routing information when multiple IP interfaces are available for outbound IP traffic. Routing entries in the routing table typically follow the syntax of <destination IP network address, network mask, gateway IP address, interface IP address, metric>. The operating system routing function will forward a packet according to the longest matched routing entries in the routing table based on the destination address in the packet.
  • According to the present invention, the location of the routing tables varies. In a bridge mode, the routing table is stored on the source subscriber's [0038] computer 10. In a routing mode, the routing tables are stored on the subscriber's ATU-R 12.
  • Regardless of where the routing table is stored, traffic packets are transmitted from the [0039] source subscriber 10 over either the new QoS connection or the default route to the ISP, based upon whether or not the packet originates from an application associated with the new QoS connection. For example, if the application requesting the SVC 50 is a video conferencing application and the packets being transmitted originate from the video conferencing application, then the video conferencing packets are transmitted over SVC 50. In other words, the packets travel from the subscriber 10, through the PVC from ATU-R 12 to the DSLAM 14, the SVC 50 from the ATM switch 15 to the ATM switch 19, and the PVC from the DSLAM 44 to the ATU-R 44 and finally to the destination subscriber 40. If the packet originates from other applications than the QoS application, the packets are transmitted, as usual, via the default route (or routes) to the ISP 24 and then on to its intended destinations.
  • Routing packets based upon the originating application will be referred to as policy based routing or filtering. Policy based routing ensures QoS for specific end user applications. According to an aspect of the present invention, the policy based routing capability is dynamic. That is, the policy based routing only occurs during a session, e.g., during a video call. When the session terminates, the ATU-[0040] R 12 receives a signal indicating the session termination and the pattern matching and filtering cease. Accordingly, all traffic is routed over the normal channel.
  • Policy based routing thus occurs when an [0041] SVC 50 has been set up. For router mode, after the setup, the PC 10 sends a header pattern to the ATU-R 12 so that the ATU-R 12 knows to filter traffic matching the received pattern. In other words, the ATU-R 12 knows to send the traffic matching the header pattern to the new QoS connection. When a packet does not match the header pattern, the packet is sent along its normal route.
  • Current routing tables have routing entries associated with a destination network address. The current entries are typically too coarse to distinguish between the specific applications for the purpose of mapping into a specific route. According to the present invention, a new gateway (i.e., the QoS connection/the SVC) exists to handle special traffic (e.g., video conference traffic). Policy routing is a function to filter the video conference traffic and direct such traffic to a separate gateway different from that default gateway define in the existing routing table. [0042]
  • In one embodiment, the syntax of the policy routing instruction is: <source IP network address, source network mask, destination IP network address, destination network mask, IP protocol ID, type of service (TOS), source port number, destination port number, gateway IP address, interface IP address, metric>. The IP protocol ID parameter defines the layer 4 protocol. The type of service parameter refers to a field in the IP header to carry information on traffic packet priority, e.g., best effort, highest priority, etc. The gateway IP address refers to the next hop. The interface IP address refers to the egress port. The metric defines an administrator assigned weight, the weight being assigned to different routes, e.g., hop count. [0043]
  • An example will now be provided. Assume the routing policy is as follows: 64.2.12.3 255.255.255.0 217.34.67.122 255.255.255.255 17 8 6000 6000 66.2.12.1 64.2.12.3 1. Then, all packets having the value matching this specific policy will be directed to gateway 66.2.12.1 via 64.2.12.3, which is a local interface IP address. [0044]
  • Referring to FIG. 3, another embodiment is described in which multiple [0045] proxy signaling servers 35, 36 are provided. In this embodiment, the source subscriber 10 and the destination subscriber 40 may be assigned to different proxy signaling agents 35, 36 at the LDAP 30. In such a case, the setup process is slightly different. If both subscribers 10, 40 are located within the same ATM domain, the connection must choose which side to originate the SVC connection and to contact the originator's proxy signaling agent 35 to set up the connection. If the subscribers 10, 40 are located in different ATM domains (as shown in FIG. 3), e.g., different vendor domains owned by a single carrier, the connection server 25 establishes two connection segments, one originating at each subscriber, to a common network to network interface (NNI) meeting point. The connection server 25 can retrieve available NNI information from the LDAP 30 to handle these types of connections. The connection server 25 can also track real time state information about NNI usage.
  • As discussed above, a router mode and a bridge mode are available. In the router mode, the ATU-[0046] R 12 functions like a traditional router. That is, the ATU-R 12 examines the layer 3 and layer 4 information and routes packets based upon such information. Accordingly, the ATU-R 12 routes at the application level. In this embodiment, the routing table resides at the ATU-R 12. Moreover, it is well known that in the router mode the PPPOE session from subscriber to ISP originates on the ATU-R 12.
  • In the bridge mode, the ATU-[0047] R 12 functions like an Ethernet bridge with additional packet mapping capabilities. Ethernet bridges without additional mapping capabilities have no IP awareness and can only perform switching at a host level of granularity. The switching is based on MAC addresses, which are unique per client. In this embodiment, the routing table resides at the client 10 and the client 10 performs the routing. In addition, a packet mapping filter at the ATU-R switches the packets into different outgoing PVCs based on mapping rules associated with each QoS session. These rules consider layer three and layer four header information in a manner similar to the described policy routing method.
  • In the bridge model, a client DSL dialer application establishes a standard, best effort PPPoE session between the [0048] client PC 10 and the ISP B-RAS 22. The ISP 24 provides the client 10 with a public IP address, which is globally reachable. In the router mode, the ISP 24 assigns the ATU-R 12 a global IP address and the ATU-R 12 performs NAT for private addresses that it, in turn, assigns to the client 10.
  • In the bridge mode, policy routing occurs in the PC and a mapping occurs in the ATU-R. That is, the PC decides whether to send traffic over the PPP session or directly to the ATU-R over Ethernet. The packet received at the ATU-R, however, requires an additional mapping step. Once the traffic is received at the ATU-R, the ATU-R determines which PVC to send the traffic over. One PVC is assigned to the PPP session, and other PVCs can match different SVCs in the ATM network. The additional mapping step is enabled by a mapping table in the ATU-R that shows which PVCs are currently attached to SVCs. Although all packet travels through the ATU-R, some packets are encapsulated in a PPP session, whereas other packets are raw IP packets transported via the Ethernet connection. [0049]
  • Regardless of whether the bridge mode or the routed mode is in use, header patterns are always sent to the ATU-R. The header patterns that are sent are the same header patterns that the PC uses to determine whether to encapsulate the packet. That is, the PC decides whether to use PPP or not, and the ATU-R decides which PVC to use. Once an SVC is set up, both tables are updated. [0050]
  • In the router mode, all policy routing occurs in the ATU-R, therefore only one table exists. Accordingly, no dynamic changes occur in the PC and packets are not encapsulated in PPP by the PC. When appropriate, the ATU-R encapsulates the packets in PPP. [0051]
  • The [0052] connection server 25 terminates customer control channel sessions, which transit the public IP network. The control channel session is used by the customers to send CONNECT and DISCONNECT requests to the connection server 25. The connection server 25, in return, reports connection status information to the customers using the control channel session. In an embodiment of the present invention, this control channel session employs authentication and encryption.
  • The [0053] connection server 25 maintains two levels of sessions: (1) a per user session anchored on the control channel connection; and (2) a per SVC session anchored on individual SVC connections set up by the service. When a user logs in, the user establishes a user session that is associated with the user ID. Once the user establishes an SVC, an SVC session is created. If the user establishes another SVC, another SVC session is created. Thus, each user session may be associated with multiple SVC sessions.
  • The [0054] connection server 25 performs the CAC function for the user ATU-R and DSLAM ports and is able to manage the complex topology of any DSLAM 14. This is necessary because the pre-provisioned PVCs in the ATU-R 12 and DSLAM 14 will require over subscription of the priority bandwidth on the DSLAM up-link ports. Over subscription occurs when a group of PVCs, with aggregate bandwidth exceeding the actual available bandwidth, are created. It is assumed that, statistically, only a fraction of the PVCs are active simultaneously and that the bandwidth used by the active fraction does not exceed the actual available bandwidth. It is advantageous to service providers to over subscribe network resources to take advantage of this statistical multiplexing effect. For example, a DSLAM up-link may have enough bandwidth to handle ten simultaneous QoS connections. The service provider may choose to provision twenty QoS PVCs on that up-link if it is expected that typically only ten or fewer of the QoS PVCs are in use at one time. In this scenario, the connection server CAC function would prevent the eleventh QoS PVC from becoming active should the actual usage exceed the expected usage. Only as many pre-provisioned QoS PVCs may be active as there is bandwidth available thus ensuring the QoS of the active connections.
  • The [0055] connection server 25 can be any server class system, such as a UNIX workstation. The connection server 25 tracks the PVCs' status in real time, monitoring whether the PVCs are in use or available. If multiple applications share a PVC, the connections server 25 monitors how much available bandwidth is allocated to each application. When enough bandwidth is not available for a connection request, the connection server 25 denies service requests. The connection server 25 handles association of PVCs and SVCs, and also reserves space on PVCs.
  • In one embodiment, each DSLAM actually includes a master DSLAM and at least one slave DSLAM. In this embodiment, the [0056] connections server 25 is aware of the DSLAM topology, e.g., the total bandwidth available on a DSLAM trunk port. The topology information is useful so that the connection server 25 is aware of which PVCs are used to connect from the trunk port of the master DSLAM to the appropriate subscriber port. The connections server 25 ensures that enough bandwidth exists for a connection request, and if so, grants the bandwidth to the user.
  • A logical view of the system is now described with reference to FIG. 2. A subscriber SVC-enabled [0057] application 100, running on the client PC, negotiates with a peer to establish agreed upon parameters for a direct SVC connection. This negotiation occurs using the best effort PPPoE channel, i.e., the control channel. Both SVC-enabled end points must agree upon a required class of service, a required bandwidth or bit rate, and a shared secret or session key that uniquely identifies the proposed session between these two end points. The mechanism of this negotiation is independent of the SVC service. For example, the negotiation could be an Instant Messaging server facilitated negotiation or a voice telephone call between users.
  • The subscriber SVC-enabled [0058] application 100 at each end-point sends a request to establish a SVC connection to its respective network service agent 102, which resides in the subscriber's computer 10 or the ATU-R 12. The request includes the source username, destination username, class of service, bandwidth, shared session key, and IP routing/mapping information.
  • The [0059] network service agent 102 can be located on either the client PC 10 or the ATU-R 12. In the bridge mode, the network service agent 102 resides on the subscriber's system 10 and in the router mode it resides on the subscriber's ATU-R 12. The network service agent 102 handles network layer connection duties, including managing an API interface between the ATU-R 12 and the subscriber 10. The network service agent 102 also manages the routing tables as well as session establishment and termination. In addition, the network service agent 102 executes packet filtering rules.
  • In one embodiment, the [0060] network service agent 102 includes two input APIs: (1) an HTTP or command line API, e.g., a Telnet based configuration suitable for direct human interaction, and (2) a socket based API for process to process communications. Users or applications, which are clients of the network service agent 102, can send CONNECT, DISCONNECT, STATUS, and REACHABILITY requests to the connection server 104 via the network service agent 102 and the secure connection between the network service agent 102 and the connection server 104. Return information from client requests should be explicitly output to the user in the case of the human readable interface. For the process to process API, return information can be returned via the socket connection between the client process 100 and network service agent 102. In addition, the client process 100 should be able to poll status information via the network service agent 102 to self determine the result of requests.
  • Because the [0061] network service agent 102 changes the routing and mapping tables, the layer 3 and layer 4 information associated with the SVC flow must be communicated by the application or user to the network service agent 102 as part of the CONNECT request. Only the information relevant to layer 2 provisioning is passed on to the connection server 104 for the SVC portion of the connection establishment.
  • Output APIs are also provided in the [0062] network service agent 102. In the bridge mode, the network service agent 102 (residing in the client 10) manipulates the static policy routing tables in the client 10 and the mapping filter function in the ATU-R 12. In the router mode, the network service agent 102 (residing in the ATU-R 12) manipulates the policy routing tables and mapping filter function of the ATU-R 12. As noted above, in the router mode the client 10 uses the ATU-R 12 as the default layer 3 gateway and does not require additional configuration.
  • The [0063] network service agent 102 is responsible for establishing a secure connection to the connection server 104, providing authentication information to the connection server 104, and authenticating the identity of the connection server 104. The network service agent 102 is also responsible for handling client requests by working with the connection server 104, over the network service agent 102/connection server 104 secure channel, to establish and tear down SVC connections and to poll current status information. In response to SVC status changes resulting from configuration requests or network events, the network service agent 102 re-configures routing and mapping tables in the client 10 and/or ATU-R 12 to maintain appropriate routing of client traffic.
  • Each network service agent (local and remote) [0064] 102 will, on-demand, establish a secure channel to the connection server 104 over the best effort PPPoE channel. The network service agent 102 also authenticates each user to determine whether the user is authorized to establish SVCs. Once authenticated, the connection server 104 authenticates the management session and responds to connection setup requests, connection tear down requests, connection status polls, and reachability inquiries.
  • In one embodiment, to service a connection setup request, the [0065] connection server 104 receives matching connection requests from both network service agents 102 within a time-out window. The connection requests should have matching attribute elements. To service a connection tear down request, the connection server 102 can receive a request from only one of the network service agents 102. The connection server 104 may respond to connection status polls with status messages indicating the SVCs in use, class of service, bandwidth, session keys, etc. Optionally, the connection server 104 may also send asynchronous status updates to the network service agents 102 upon connection and/or disconnection.
  • In the event of connection setup or tear down, the [0066] connection server 104 communicates with the proxy signaling agent 106 to accomplish the requested provisioning task. The proxy signaling agent 106 signals the network elements to provision the SVC. Upon confirmation of successful provisioning, the SVC status is passed back to the connection server 104 and to the network service agent 102.
  • After receiving verification of SVC setup, each [0067] network service agent 102 changes policy routing tables in the PC 10 or ATU-R 12, in bridge and routing modes, respectively; changes mapping functions in the ATU-R 12; and informs the requesting subscriber SVC-enabled application 100 that the SVC channel has been configured. The mapping functions in the ATU-R 12 include the rules that the ATU-R 12 should use for filtering each packet and directing the packet into a specific PVC that connects to the SVC. As discussed above, the mapping function is dynamically established to correspond to the SVC session duration.
  • Informing the [0068] application 100 that the SVC channel has been configured may be accomplished in a session established between the subscriber SVC-enabled application 100 and the network service agent 102. Alternatively, the subscriber SVC-enabled application 100 may simply poll the network service agent 102 for connection status to self determine success or failure.
  • Once the SVC has been established and appropriate routing changes have been made, packets matching the policy routing and/or mapping rules will be transmitted over the SVC channel as long as the SVC is active. [0069]
  • The SVC may be deactivated by either: (1) the subscriber SVC-enabled [0070] application 100 sending a disconnect request to the connection server 104 via its network service agent 102, (2) termination of the connection server 104 to network service agent 102 management channel (either explicit or time-out), or (3) a network event such as re-routing or other failure. When a network event occurs, the SVC status is known by the proxy signaling agent 106 and communicated to the connection server 104. Moreover, the connection server 104 informs both sides that the SVC has been cleared. In the event of a disconnect request or termination of the management channel, the connection server 104 informs the non-disconnected side that the SVC has been cleared.
  • Upon notification of SVC tear down via either an update message or status polling, the [0071] network service agent 102 modifies the policy routing and mapping tables in the client device 10 and/or ATU-R 12 to reflect the change in connectivity.
  • Communications between the [0072] network service agent 102 and the connection server 104 are now discussed in more detail.
  • A CONNECT request should include the following parameters: source subscriber, destination subscriber, class of service, bandwidth, and session key. In order to process the CONNECT request, matching CONNECT requests should be received from both the source subscriber and the destination subscriber within a time-out period. The [0073] connection server 104 processes validated CONNECT requests by querying the LDAP 30 to determine required provisioning information, such as AESAs, available PVC identifiers at each end-point, etc. The connection server 104 also selects suitable PVC identifiers, class of service, and traffic descriptors, and performs CAC functions for ATU-R and DSLAM ports based on real time SVC tracking information and port speeds obtained from the LDAP 30. Finally, the connection server 104 services validated CONNECT requests by passing provisioning information to the proxy signaling agent 106.
  • Upon being notified by the [0074] proxy signaling agent 106 of successful provisioning or failure to provision, the connection server 104 updates its internal real time SVC session tracking information. The provisioning result may be communicated to the calling network service agents 102 by an explicit response to the CONNECT request and/or waiting for the network service agent 102 to inquire about the current SVC status information (polling).
  • A DISCONNECT request should include the following parameters: source subscriber, destination subscriber, class of service, bandwidth, and session key. A DISCONNECT request is determined to be valid when it is received from one or both [0075] network service agents 102 and it matches an existing, previously established SVC connection. The connection server 104 services valid DISCONNECT requests by matching the DISCONNECT request with its real time SVC tracking table, and communicating stored information to the proxy signaling agent 106 to clear the SVC.
  • Upon provisioning success or failure, communicated by the [0076] proxy signaling agent 106, the connection server 104 updates its internal real time SVC session tracking information. The provisioning result may be communicated to the calling network service agent 102 by an explicit response to the DISCONNECT request and/or waiting for the network service agent 102 to inquire about the current SVC status information (polling).
  • A STATUS request requires no parameters. The [0077] connection server 104 simply updates the requesting network service agent 102 with the status of all SVCs terminated by the ATU-R 12 managed by the network service agent 102.
  • A REACHABILITY request requires a destination subscriber parameter. In response to a REACHABILITY request, the [0078] connection server 104 informs the querying network service agent 102 of whether the destination subscriber is reachable, via SVC, from the source subscriber 10. The response to the request only confirms that source to destination connectivity is possible, and it does not take into account available bandwidth, etc.
  • Each [0079] network service agent 102 connects to the connection server 104 to initiate SVC connections. This network service agent 102 to connection server 104 connection is made over the public Internet, and it must be authenticated and secure.
  • If the [0080] network service agent 102 to connection server 104 connection is dropped or times out, any SVCs established by the network service agent's username is automatically released by the connection server 104. In the case of multiple network service agent 102 to connection server 104 connections using the same username (PC client based network service agent 102), all SVCs established under the username must be released automatically once the final network service agent 102 to connection server 104 connection is dropped or times out. Time outs may be determined using an explicit keep-alive mechanism if this is not provided by the secure encryption layer.
  • 2. Extended Virtual UNI
  • An advantage of the proxy signaling approach, described above, is that such an approach does not require SVC capability for ATU-Rs or for DSLAMs. If the ATU-R does have SVC capability, and DSLAM does not support SVC, another approach may be employed. Such an approach will be referred to as Extended Virtual UNI. [0081]
  • Extended Virtual UNI enables an SVC to be set up between an originating ATU-R and a destination ATU-R, through the ATM network, using an established range of VCs within a single VP. Conventionally, initiating an SVC from an ATU-R to an ATM edge switch using Virtual UNI (e.g., ATM Forum UNI [0082] 4.0) presents a scalability problem when the deployed DSLAM is not SVC capable. Each Virtual UNI requires the use of one VP, a limited number of which are available at each port of the DSLAM and at the ATM switch. Therefore, use of Virtual UNI to enable SVCs between the ATU-R and the ATM switch is unacceptably restrictive and impractical.
  • According to the present invention, each VP (identified by a corresponding VPI) is segmented into a number of VC ranges, consisting of multiple, contiguous VCs (identified by corresponding VCI address ranges). Each of the VC ranges accommodates a Virtual UNI, greatly increasing the capacity of each VP to support multiple Virtual UNIs. A VC range includes at least one VC dedicated to control and at least one VC dedicated to data. The control VCs include a signaling channel, which enables setting up and tearing down the SVCs. The control VC and the signaling channel may be one in the same. However, when there are multiple contiguous control VCs, only one VC need be dedicated to signaling. The remaining control VCs may support additional control information, such as interim local management interface (ILMI) data, for example. The VC range and the associated VP appear in the header of every ATM cell that is sent to the destination once the SVC has been established. [0083]
  • FIG. 4 is a table indicating an exemplary VPI/VCI arrangement for Extended Virtual UNI, in which sixteen VPs are segmented to support over 3000 Virtual UNIs by segmenting each VP into multiple sets of five contiguous VCs, indicated by the corresponding VCIs. Although FIG. 4 shows an embodiment in which the number of VCs for each VP for each Virtual UNI is set at five, it is understood that the number of VCs may be any subset of contiguous VCs within the corresponding VP, without departing from the scope and spirit of the present invention. [0084]
  • The first column of FIG. 4 indicates the virtual path connection index (VPCI) that identifies the Virtual UNI corresponding to the range of VCs within a particular VP. As indicated, there are sixteen VPs, which is the typical number of VPs corresponding to a port of an ATM edge switch, although alternative numbers of VPs for each port may be used without departing from the scope and spirit of the present invention. Each VP is segmented into 198 VCI ranges, corresponding to 198 Virtual UNIs. Therefore, according to the depicted embodiment, a total of 3168 Virtual UNIs are accommodated through one port of the ATM edge switch. [0085]
  • The second column of FIG. 4 identifies the VPI/VCI range in each of the sixteen VPs. As stated above, each VCI address range has been predetermined to include five VCs in the present example. Accordingly, [0086] VPCI number 1 is established through VCIs 32 to 36 of VPI number 1, and VPCI number 396 is established through VCIs 1022 to 1026 of VPI number 2. (The first Virtual UNI is shown to begin at VCI 32 because VCIs 0-31 within each VPI are typically reserved for signaling data.) The relationship between the range of VCIs and the number of the Virtual UNI is indicated generally in the row corresponding to VPCI n+1. In particular, the VCI range for VPCI n+1 extends from 32 +(5*n) to 36+(5*n).
  • The third column of FIG. 4 identifies the control channel for each VPCI. The control channel carries the signaling that enables connection setup, identification of network elements and clients, and the like. As discussed above, at least one control channel in a VC range must be dedicated to transmitting signaling relating to the network, although additional control channels may accommodate addition types of control data. In the exemplary embodiment of FIG. 4, each VC range includes one control channel (e.g., assigned to the first VC of each VC range). For example, the control channel of [0087] VPCI number 1 is VCI 32 within VPI 1 (i.e., 1/32), and the control channel of VPCI number 3168 is VCI 1022 within VPI 16.
  • Extended Virtual UNI is implemented in a packet based communications network, such as the ATM network depicted in FIG. 6. FIG. 6 depicts various network elements generally similar to those described above with respect to FIG. 1, to the extent the reference numerals correspond. Implementation of Extended Virtual UNI requires software enhancements to various network elements, including the ATU-[0088] R 12, the DSLAM 14 and the ATM switch 15. In an embodiment of the invention, the enhanced ATU-R 12 supports ATM Forum UNI 3.1, UNI 4.0 and ILMI. An API to a network service agent, such as the network service agent 102 of FIG. 2, is included to enable SVC initiation. The ATU-R 12 also includes decode/encode capability up to layer 4 (e.g., TCP/JDP) for the routed mode. The enhanced ATU-R 12 also requires policy-based routing, enabling packets to be forwarded on different VCs (e.g., based on L1-L4 information), and VC based queuing, scheduling and shaping, enabling forwarded traffic to conform to the SVC parameters.
  • In the exemplary embodiment, the [0089] DSLAM 14 is pre-configured with cross-connect PVCs, which map the signaling channel's VPI/VCI address and the data channels' VPI/VCI addresses in the UNI of the ATU-R 12 to Extended Virtual UNI addresses in the ATM switch 15. For example, the cross-connect PVCs in the DSLAM 14 may be pre-configured to map ATU-R 12 UNI addresses to Extended Virtual UNI addresses as follows: The UNI signaling channel is mapped from VPI/VCI 0/5 to VPI/VCI 3/60; the CBR channel is mapped from VPI/VCI 0/32 to VPI/VCI 3/61; the VBR-rt is mapped from VPI/VCI 0/40 to VPI/VCI 3/62; and the VBR-nrt is mapped from VPI/VCI 0/48 to VPI/VCI 3/63. Consistent with the invention, the VPI/VCIs of the Extended Virtual UNI indicate contiguous VCs within the same VP.
  • The [0090] ATM switch 15 is configured to support Extended Virtual UNI. Also, additional levels of CAC are required for traffic management of the DSLAM trunk port congestion point and customer service control, including Logical Port (UNI) Level CAC, Extended Virtual UNI Level CAC, and per connection level CAC. The connection level CAC enables the SVC call request to be matched to a pre-provisioned PVC in the DSLAM 14. Furthermore, the ATM switch 15 stores the following information in relation to each Extended Virtual UNI: a service-active identifier, which is set upon subscription to the service; a VPI/VCI range, identifying the VP and the range of contiguous VCs within the VP; a maximum equivalent bandwidth and an available bandwidth; and information regarding the PVCs pre-configured in the DSLAM 14. The PVC information includes, for example, the VPI/VCI of the Extended Virtual UNI, the VPI/VCI of the ATU-R 12 UNI, the service category (e.g., CBR, VBR-rt, VBR-nrt, UBR), traffic descriptors (e.g., PCR, SCR, MBS), QoS parameters (cell loss rate, latency, jitter), and the status of the connection (e.g., busy, free).
  • In an embodiment of the invention, an element management system (EMS)/[0091] provisioning server 27 servicing the ATM network 16 is also included. The EMS/provisioning server 27 supports SVC call based billing functions, such as usage based accounting. The EMS/provisioning server 27 is also enhanced to support configuration of Extended Virtual UNI in the edge switches, such as the ATM switches 15 and 19.
  • FIG. 5 is an exemplary call flow diagram showing an SVC established through the [0092] ATM network 16, using Extended Virtual UNI, between the source subscriber 10 and the destination subscriber 40. The request to setup the SVC is initiated by the source subscriber 10. In the depicted embodiment of the invention, the source subscriber 10 initially contacts the ISP 24 via the Internet 20 (not pictured in FIG. 5) at step 510. The source subscriber 10 identifies the destination subscriber 40, for example, by providing an associated IP address to the ISP 24. At step 511, the subscriber 10 queries a database through the ISP 24, such as the LDAP 30, to retrieve the AESA of the ATU-R 42, corresponding to the destination subscriber 40, based on the IP address provided by the source subscriber 10 at step 510. The LDAP 30 performs a lookup of the AESA and replies with the AESA of the ATU-R 42 at step 512, which is forwarded to the source subscriber 10 at step 513.
  • In alternative embodiments, the [0093] source subscriber 10 identifies the AESA of the ATU-R 42 in any appropriate manner, without departing form the scope and spirit of the present invention. For example, the source subscriber 10 may maintain a pre-established database of AESAs for commonly connected destinations. Alternatively, the AESA may be retrieved from an instant messaging server.
  • Once the [0094] source subscriber 10 has retrieved the AESA, it initiates a connection with the ATM network 16 by sending a signaling message, such as a setup connection request, to the ATU-R 12 at step 514. In an embodiment of the invention, the QoS application sends a QoS connection setup message through the API to the ATU-R. The setup message carries the service category, the traffic descriptors and the QoS parameter, described above. In an alternative embodiment, the QoS application sends the QoS connection setup message through the API to a network service agent (not pictured in FIG. 5), such as the network service agent 102 of FIG. 2. The network service agent translates the connection setup message and forwards it to an SVC signaling entity in the ATU-R 12. The signaling message also includes the AESA of the destination subscriber 40, as well as the QoS requirement for supporting the underlying application.
  • Upon receipt of the connection setup request, the ATU-[0095] R 12 sends a standard SVC SETUP message over a standard UNI signaling channel, transparently through the DSLAM 14, to the Extended Virtual UNI of the ATM switch 15 at steps 515 and 516. The standard UNI signaling channel is cross-connected by DSLAM 14 to the first channel (or first set of contiguous control channels) of the Extended Virtual UNI in the ATM switch 15. The first channel is, by default, the signaling channel of the Extended Virtual UNI. The SETUP message likewise includes the AESA of the destination subscriber 40 and the QoS requirement. For example, when a SETUP message is received on a VC having a VPI/VCI of 1/37, the UNI is mapped to the Extended Virtual UNI corresponding to VPCI number 2 (VPI INCIs 37-41).
  • When the [0096] ATM switch 15 receives the SETUP message, it initially determines whether the requested connection is authorized and the requested service is available. The ATM switch 15 then performs various CAC functions, discussed above. For example, the ATM switch 15 performs a standard ATM UNI CAC and an Extended Virtual UNI CAC to determine whether there is enough available or equivalent bandwidth to accommodate the new connection. If not, the ATM switch 15 sends a reject message back to ATU-R 12, indicating the reason for failure as not enough network resources.
  • The [0097] ATM switch 15 also performs a connection CAC to determine whether any of the pre-configured PVCs in the DSLAM 14 for this subscriber can satisfy the requirement of the connection based on traffic descriptors and QoS requirements. If not, it sends a reject message back to ATU-R 12 with the reason for failure as not enough network resources. If the pre-configured PVCs can satisfy the requirement, the ATM switch 15 selects a PVC with the lowest service category and lowest bandwidth from all of the PVCs that satisfy the requirement and extracts the necessary data associated with the selected PVC, including VPI/VCI in the Virtual Extended UNI, corresponding VPI/VCI in ATU-R UNI.
  • The [0098] ATM switch 15 then initiates a standard SVC connection setup procedure. For example, the ATM switch responds to the ATU-R 12 with a CALL-PROCEED message at step 517 to indicate initiation of the requested connection at the QoS requirement. The message informs the ATU-R 12 which VPI/VCI should be used for this connection.
  • At [0099] step 518, the ATM switch 15 sends the SETUP message to the terminating edge switch, ATM switch 19, through the ATM network 16 (not pictured in FIG. 5). The message may be routed directly to the ATM switch 19, or may pass through any number of intervening switches, depending on the layout of the ATM network 16. All transit (i.e., non-terminating) ATM switches treat the call as a standard SVC call.
  • When the [0100] ATM switch 19 receives the SETUP message, it performs the same CACs as the ATM switch 15, described above, to check whether there are enough network resources to accommodate this connection. When any of the CAC checks fail, a standard release message is returned to the ATM switch 15. When all of the CAC checks are passed, the ATM switch 19 selects a PVC with the lowest service category and lowest bandwidth from the PVCs that satisfy the requirement, in the manner discussed above. The ATM switch 19 extracts the necessary data associated with the PVC, including VPI/VCI in the Virtual Extended UNI, corresponding VPI/VCI in the UNI of the ATU-R 42.
  • The [0101] ATM switch 19 sends the SETUP message to the ATU-R 42, via the DSLAM 44, at steps 519 and 520, specifying the VPI/VCI in the SETUP message that ATU-R 42 UNI should use for the connection. The ATU-R 42 sends a CALL-PROCEED message to the ATM switch 19 at step 521 (via the DSLAM 44) to indicate initiation of the requested connection. At step 522, the ATU-R 42 sends a CONNECT message (via the DSLAM 44), indicating that it has accepted the call. The ATM switch 19 returns a CONNECT-ACKNOWLEDGE message to the ATU-R 42 at step 523 (via the DSLAM 44) and sends a CONNECT message to the ATM switch 15 at step 524 through the ATM network 16. The ATM switch 15 likewise sends a CONNECT message to the ATU-R 12 at step 525 (via the DSLAM 14), utilizing the established Extended Virtual UNI. For example, when the Virtual UNI is VPCI number 2 (indicated by FIG. 4), the CONNECT message passes to the ATU-R 12 via the VC identified by VPI/VCI 1/37. A CONNECT-ACKNOWLEDGE message is returned to the ATM switch 15 at step 526 (via the DSLAM 14). The resulting SVC connection is indicated by the dashed line at step 527.
  • The ATU-[0102] R 12 acknowledges to the source subscriber 10 that the SVC has been set up at step 528. In an embodiment of the invention, once the connection is built successfully, each of the ATU-R 12 and the ATU-R 42 informs its respective network service agent (not pictured in FIG. 5) to add a specific policy routing entry into its routing table (e.g., in the corresponding PC for the bridge mode and in the ATU-R for the routed mode). The calling end network service agent informs the corresponding application that the QoS connection is ready for use.
  • When the application proceeds, the [0103] source subscriber 10 sends a request to use the SVC to the ATU-R 12 at step 529. The request includes, for example, the IP address and port address of the destination subscriber 40, the protocol ID and the QoS. The connection between the source subscriber 10 and the destination source 40, including the SVC, is indicated by step 530. The signaling and data passed over the SVC is mapped to the VPI/VCIs of the Extended Virtual UNI as established during the connection setup.
  • According to an exemplary call release procedure for the peer to peer QoS service with Extended Virtual UNI, just before the QoS application is closed, the application sends a message through network service agent to the ATU-[0104] R 12 to release the QoS connection. The ATU-R 12 sends a standard release message to the ATM switch 15 and deletes the corresponding policy routing entry in the routing table. The ATM switch 15 performs standard SVC release actions and, at the same time, releases the occupied PVC. The ATM switch 15 accordingly adds the equivalent bandwidth of the connection back to the available bandwidth of the Extended Virtual UNI and the available bandwidth of the DSLAM trunk port.
  • When the ATU-[0105] R 42 receives the release message, it likewise deletes the corresponding policy routing entry in the routing table, and responds with a standard UNI signaling message (e.g., a RELEASE COMPLETE message) to the ATM switch 19. When the ATM switch 19 receives the RELEASE COMPLETE message, it performs the same actions as the ATM switch 15, releasing the utilized resources.
  • The provisioning, control and billing of the Extended Virtual UNI service may be implemented by known methods. In an embodiment of the present invention, the ATM edge switches are the service provisioning and control points. Therefore, customers, who signal SVC connection requests without ordering peer to peer QoS services, receive no response to the UNI signaling since a service active identifier is not initially set in the corresponding ATM switch. Also, service related data is configured through the EMS/[0106] provisioning server 27, discussed above, into the corresponding ATM edge switch. Extended Virtual UNI based CAC functions limit the actual allocated equivalent bandwidth, to avoid exceeding the maximum equivalent bandwidth for the Extended Virtual UNI. Policing may be imposed on each connection based on the traffic descriptors. Billing likewise may be based on traffic descriptors, as well as service categories, duration and traffic usage.
  • Using Extended Virtual UNI, the [0107] ATM switch 15 is able to support the SVC between the ATU-R 10 and the ARU-R 42 without having to dedicate an entire VP to that single SVC. The ATM switch is able to meet the QoS requirements and still support additional Virtual UNIs through the same VP, more efficiently utilizing the VCs within one VP. Thus, according to the present invention multiple subscribers can connect to the ATM network 16 and set up SVCs using respective Virtual UNIs, corresponding to distinct ranges of contiguous VCs within a single VP. Consequently, additional SVCs are enabled through the network, guaranteeing QoS for specific end user applications, without having to expand the physical port capacity of various network elements.
  • Although the invention has been described with reference to several exemplary embodiments, it is understood that the words that have been used are words of description and illustration, rather than words of limitation. Changes may be made within the purview of the appended claims, as presently stated and as amended, without departing from the scope and spirit of the invention in its aspects. Although the invention has been described with reference to particular means, materials and embodiments, the invention is not intended to be limited to the particulars disclosed; rather, the invention extends to all functionally equivalent structures, methods, and uses such as are within the scope of the appended claims. For example, although the description has been directed towards setting up a QoS connection to a peer subscriber, the connection(s) could also be set up to one or more application service providers (ASPs). [0108]
  • In accordance with various embodiments of the present invention, the methods described herein are intended for operation as software programs running on a computer processor. Dedicated hardware implementations including, but not limited to, application specific integrated circuits, programmable logic arrays and other hardware devices can likewise be constructed to implement the methods described herein. Furthermore, alternative software implementations including, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the methods described herein. [0109]
  • It should also be noted that the software implementations of the present invention as described herein are optionally stored on a tangible storage medium, such as: a magnetic medium, e.g., a disk or tape; a magneto-optical or optical medium such as a disk; or a solid state medium such as a memory card or other package that houses one or more read-only (non-volatile) memories, random access memories, or other re-writable (volatile) memories. A digital file attachment to email or other self contained information archive or set of archives is considered a distribution medium equivalent to a tangible storage medium. Accordingly, the invention is considered to include a tangible storage medium or distribution medium, as listed herein and including art-recognized equivalents and successor media, in which the software implementations herein are stored. [0110]
  • Although the present specification describes components and functions implemented in the embodiments with reference to particular standards and protocols, the invention is not limited to such standards and protocols. Each of the standards for signaling and packet-switched network transmission and public telephone networks (e.g., ATM and DSL) represent examples of the state of the art. Such standards are periodically superseded by faster or more efficient equivalents having essentially the same functions. Accordingly, replacement standards and protocols having the same functions are considered equivalents. [0111]

Claims (20)

What is claimed:
1. A method of establishing at least one SVC via an ATM switch port, the ATM switch port comprising a plurality of VPs, the method comprising:
associating a plurality of virtual UNIs to each of the plurality of VPs.
2. The method of establishing at least one SVC according to claim 1, in which each VP of the plurality of VPs comprises a plurality of VC ranges, each VC range corresponding to a different virtual UNI of the plurality of virtual UNIs.
3. The method of establishing at least one SVC according to claim 2, in which each VC range comprises at least one VC for control and at least one VC for data transfer.
4. The method of establishing at least one SVC according to claim 2, in which associating the plurality of virtual UNIs to each of the plurality of VPs comprises mapping each virtual UNI to a corresponding VC range within a VP based on a VPI/VCI of the virtual UNI initially received by the ATM switch port.
5. A method for supporting a plurality of virtual UNIs within a single VP, which includes a plurality of VCs, the method comprising:
assigning a virtual UNI to the VP;
assigning at least one control VC of the plurality of VCs to the virtual UNI; and
assigning at least one data VC of the plurality of VCs to the virtual UNI, the at least one data VC being contiguous with the at least one control VC;
wherein a plurality of virtual UNIs are available for the VP.
6. The method for supporting a plurality of virtual UNIs according to claim 5, further comprising:
determining a quality of service associated with an application of the virtual UNI; and
assigning at least one of the at least one control VC and the at least one data VC based on the quality of service.
7. The method for supporting a plurality of virtual UNIs according to claim 6, further comprising:
determining a minimum number of contiguous data VCs needed to support the quality of service; and
assigning the determined number of data VCs to the virtual UNI.
8. The method for supporting a plurality of virtual UNIs according to claim 6, further comprising:
determining a minimum number of contiguous control VCs needed to support the required quality of service; and
assigning the determined number of control VCs to the virtual UNI.
9. The method for supporting a plurality of virtual UNIs according to claim 5, in which the at least one control VC is a signaling channel.
10. A method for establishing an SVC in an ATM network, comprising:
receiving a signaling message, via a virtual UNI, to set up the SVC;
assigning the virtual UNI to a range of VCs with within a single VP, based on a VPI/VCI of the signaling message, the VP including at least one additional range of VCs assigned to another virtual UNI; and
establishing the SVC using the range of VCs assigned to the virtual UNI.
11. A system for establishing at least one SVC in an ATM network, comprising:
an ATM network element having a plurality of ports, each port supporting a plurality of VPs, the ATM network element associating a plurality of virtual UNIs to each of the plurality of VPs.
12. The system for establishing at least one SVC according to claim 11, in which each VP of the plurality of VPs comprises a plurality of VC ranges, each VP range corresponding to a different virtual UNI of the plurality of virtual UNIs.
13. The system for establishing at least one SVC according to claim 12, in which each VC range comprises at least one VC for control and at least one VC for data transfer.
14. The system for establishing at least one SVC according to claim 12, in which the ATM network element associates the plurality of virtual UNIs to each of the plurality of VPs by mapping each virtual UNI to a corresponding VC range within a VP based on a VPI/VCI of the virtual UNI initially received at a corresponding one of the plurality of ports.
15. The system for establishing at least one SVC according to claim 11, in which the ATM network element comprises one of an ATM edge switch and a DSLAM.
16. A computer readable medium for storing a computer program that establishes at least one SVC via an ATM switch port, the ATM switch port comprising a plurality of VPs, the computer readable medium comprising:
an associating source code segment that associates a plurality of virtual UNIs to each of the plurality of VPs.
17. The computer readable medium according to claim 16, in which each VP of the plurality of VPs comprises a plurality of VC ranges, each VC range corresponding to a different virtual UNI of the plurality of virtual UNIs.
18. The computer readable medium according to claim 17, in which each VC range comprises at least one VC for control and at least one VC for data transfer.
19. The computer readable medium according to claim 17, further comprising:
a mapping source code segment that maps each virtual UNI to a corresponding VC range within a VP based on a VPI/VCI of the virtual UNI initially received by the ATM switch port, the associating source code segment associating the plurality of virtual UNIs to each of the plurality of VPs based on the mapping.
20. The computer readable medium according to claim 17, further comprising:
a determining source code segment that determines a size of each VC range based on an application of the corresponding virtual UNI.
US10/369,505 2003-02-21 2003-02-21 Extended virtual user-to-network interface with ATM network Expired - Fee Related US7382785B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/369,505 US7382785B2 (en) 2003-02-21 2003-02-21 Extended virtual user-to-network interface with ATM network
US12/057,581 US7839866B2 (en) 2003-02-21 2008-03-28 Extended virtual user-to-network interface with ATM network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/369,505 US7382785B2 (en) 2003-02-21 2003-02-21 Extended virtual user-to-network interface with ATM network

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/057,581 Continuation US7839866B2 (en) 2003-02-21 2008-03-28 Extended virtual user-to-network interface with ATM network

Publications (2)

Publication Number Publication Date
US20040165592A1 true US20040165592A1 (en) 2004-08-26
US7382785B2 US7382785B2 (en) 2008-06-03

Family

ID=32868080

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/369,505 Expired - Fee Related US7382785B2 (en) 2003-02-21 2003-02-21 Extended virtual user-to-network interface with ATM network
US12/057,581 Expired - Fee Related US7839866B2 (en) 2003-02-21 2008-03-28 Extended virtual user-to-network interface with ATM network

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/057,581 Expired - Fee Related US7839866B2 (en) 2003-02-21 2008-03-28 Extended virtual user-to-network interface with ATM network

Country Status (1)

Country Link
US (2) US7382785B2 (en)

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040172485A1 (en) * 2001-04-11 2004-09-02 Kianoosh Naghshineh Multi-purpose switching network interface controller
US20040177107A1 (en) * 2003-02-26 2004-09-09 Wu Qing Method for providing services with guaranteed quality of service in IP access network
US20040228356A1 (en) * 2003-05-15 2004-11-18 Maria Adamczyk Methods of providing data services over data networks and related data networks, data service providers, routing gateways and computer program products
US20050002335A1 (en) * 2003-05-15 2005-01-06 Maria Adamczyk Methods of implementing dynamic QoS and/or bandwidth provisioning and related data networks, data service providers, routing gateways, and computer program products
US20050013301A1 (en) * 2003-07-14 2005-01-20 Alcatel Method for setting up a connection
US20050015494A1 (en) * 2003-05-15 2005-01-20 Maria Adamczyk Data architectures for managing quality of service and/or bandwidth allocation in a regional/access network (RAN)
US20050039213A1 (en) * 2003-08-11 2005-02-17 Joseph Matarese Optimal provisioning and management of bandwidth in a video-on-demand services architecture
US20050226232A1 (en) * 2003-06-24 2005-10-13 Tan-Nhon Pham Differentiated management of non-umts traffic in a umts access network
US20060039381A1 (en) * 2004-08-20 2006-02-23 Anschutz Thomas Arnold Methods, systems, and computer program products for modifying bandwidth and/or quality of service in a core network
US20060143703A1 (en) * 2003-12-10 2006-06-29 Chris Hopen Rule-based routing to resources through a network
US20060155778A1 (en) * 2004-12-03 2006-07-13 Oracle International Corporation Updateable fan-out replication with reconfigurable master association
WO2007003875A1 (en) * 2005-07-06 2007-01-11 Wei Huang Method and apparatus for quality guaranteed video services
US20070061887A1 (en) * 2003-12-10 2007-03-15 Aventail Corporation Smart tunneling to resources in a network
US20070116004A1 (en) * 2005-11-22 2007-05-24 Kuk Chang Kang Method and apparatus for guaranteeing QoS using end-to-end CAC in internet service network
US20080025299A1 (en) * 2006-07-28 2008-01-31 Cisco Technology, Inc. Techniques for exchanging DHCP information among DHCP relay agents and DHCP servers
US20080025218A1 (en) * 2004-08-05 2008-01-31 Enhui Liu Method, Apparatus, Edge Router and System for Providing Qos Guarantee
US20080109559A1 (en) * 2006-11-03 2008-05-08 Cisco Technology, Inc. Automatically controlling operation of a BRAS device based on encapsulation information
US20080151906A1 (en) * 2004-05-14 2008-06-26 Tut Systems, Inc. System and Method for Transparent Virtual Routing
US20080159298A1 (en) * 2006-12-27 2008-07-03 Entry Point, Llc System and method to provide multiple private networks
US20080212598A1 (en) * 2003-05-16 2008-09-04 Tut Systems, Inc. System and Method for Transparent Virtual Routing
US20080310424A1 (en) * 2006-12-27 2008-12-18 Entry Point, Llc System and method to provide multiple private networks using mpls
US7616563B1 (en) 2005-08-31 2009-11-10 Chelsio Communications, Inc. Method to implement an L4-L7 switch using split connections and an offloading NIC
US7660264B1 (en) 2005-12-19 2010-02-09 Chelsio Communications, Inc. Method for traffic schedulign in intelligent network interface circuitry
US7660306B1 (en) 2006-01-12 2010-02-09 Chelsio Communications, Inc. Virtualizing the operation of intelligent network interface circuitry
US7715436B1 (en) 2005-11-18 2010-05-11 Chelsio Communications, Inc. Method for UDP transmit protocol offload processing with traffic management
US7724658B1 (en) 2005-08-31 2010-05-25 Chelsio Communications, Inc. Protocol offload transmit traffic management
US7760733B1 (en) 2005-10-13 2010-07-20 Chelsio Communications, Inc. Filtering ingress packets in network interface circuitry
US7826350B1 (en) 2007-05-11 2010-11-02 Chelsio Communications, Inc. Intelligent network adaptor with adaptive direct data placement scheme
US7831720B1 (en) 2007-05-17 2010-11-09 Chelsio Communications, Inc. Full offload of stateful connections, with partial connection offload
US7831745B1 (en) 2004-05-25 2010-11-09 Chelsio Communications, Inc. Scalable direct memory access using validation of host and scatter gather engine (SGE) generation indications
US7889717B2 (en) 2000-08-07 2011-02-15 At&T Labs, Inc. Multiservice use of network connection capability
US20110167101A1 (en) * 2004-06-24 2011-07-07 Chris Hopen End Point Control
US20110216779A1 (en) * 2006-12-27 2011-09-08 Entry Point, Llc System and method to provide multiple private networks using pbb
US8060644B1 (en) 2007-05-11 2011-11-15 Chelsio Communications, Inc. Intelligent network adaptor with end-to-end flow control
US20110317559A1 (en) * 2010-06-25 2011-12-29 Kern Andras Notifying a Controller of a Change to a Packet Forwarding Configuration of a Network Element Over a Communication Channel
US8582580B2 (en) 2006-12-27 2013-11-12 Entry Point, Llc System and method to provide multiple private networks using PBB/TE
US8589587B1 (en) 2007-05-11 2013-11-19 Chelsio Communications, Inc. Protocol offload in intelligent network adaptor, including application level signalling
US8935406B1 (en) 2007-04-16 2015-01-13 Chelsio Communications, Inc. Network adaptor configured for connection establishment offload
US20150296051A1 (en) * 2012-11-21 2015-10-15 Qatar Foundation Methods, remote access systems, client computing devices, and server devices for use in remote access systems
US20150334115A1 (en) * 2012-04-12 2015-11-19 Hewlett-Packard Development Company, L.P. Dynamic provisioning of virtual systems
US20160227229A1 (en) * 2015-02-04 2016-08-04 Harris Corporation Mobile ad hoc network media aware networking element
US11025752B1 (en) 2015-07-20 2021-06-01 Chelsio Communications, Inc. Method to integrate co-processors with a protocol processing pipeline

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7643489B2 (en) * 2003-04-02 2010-01-05 Gigaset Communications Dallas Llc Methods and systems for providing bandwidth on demand in communication systems
US20040228291A1 (en) * 2003-05-15 2004-11-18 Huslak Nicolas Steven Videoconferencing using managed quality of service and/or bandwidth allocation in a regional/access network (RAN)
US7437458B1 (en) * 2003-06-13 2008-10-14 Juniper Networks, Inc. Systems and methods for providing quality assurance
EP1499156B1 (en) * 2003-07-15 2007-08-15 Alcatel Lucent Method and access multiplexer for establishing a path, having a certain QoS-class
US8046463B1 (en) * 2003-08-27 2011-10-25 Cisco Technology, Inc. Method and apparatus for controlling double-ended soft permanent virtual circuit/path connections
JP4715750B2 (en) * 2004-11-04 2011-07-06 パナソニック株式会社 Multi-interface communication device, terminal, and path switching method
US8219622B2 (en) * 2005-02-09 2012-07-10 Verizon Business Global Llc Systems and methods for providing extended peering
US20070121641A1 (en) * 2005-10-21 2007-05-31 Hovey Matthew N Method and system for network services with a mobile vehicle
US7852863B2 (en) * 2007-12-20 2010-12-14 Ciena Corporation System and methods for connections using automatically switched optical network control planes
US20120311166A1 (en) * 2011-06-03 2012-12-06 Garcia Jr Roberto Pipe Selection Heuristics
CN103188174B (en) * 2011-12-31 2017-02-08 北京大唐高鸿软件技术有限公司 Line-speed processing cell method and device of automatic teller machine (ATM) multiple service access exchange board

Citations (81)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10866A (en) * 1854-05-02 Improvement in machinery for making rope
US143959A (en) * 1873-10-28 Improvement in buckets
US150110A (en) * 1874-04-21 Improvement in whitewash-brushes
US2999514A (en) * 1958-06-25 1961-09-12 Union Tank Car Co Controls for fluid treatment apparatus
US4494231A (en) * 1981-01-23 1985-01-15 Serge Slawy Time division switching system for circuit mode and packet mode channels
US5051982A (en) * 1989-07-27 1991-09-24 Data General Corporation Methods and apparatus for implementing switched virtual connections (SVCs) in a digital communications switching system
US5274643A (en) * 1992-12-11 1993-12-28 Stratacom, Inc. Method for optimizing a network having virtual circuit routing over virtual paths
US5490141A (en) * 1994-09-30 1996-02-06 International Business Machines Corporation System and method for providing SVC service through an ATM network for frame relay DTEs with a terminal adapter
US5610969A (en) * 1994-12-23 1997-03-11 Bell Atlantic Mobile Systems, Inc. Personal communication service registration system and method
US5764645A (en) * 1996-06-12 1998-06-09 Microsoft Corporation IP/ATM network adaptation
US5828838A (en) * 1996-06-20 1998-10-27 Intel Corporation Method and apparatus for conducting multi-point electronic conferences
US5842040A (en) * 1996-06-18 1998-11-24 Storage Technology Corporation Policy caching method and apparatus for use in a communication device based on contents of one data unit in a subset of related data units
US5892924A (en) * 1996-01-31 1999-04-06 Ipsilon Networks, Inc. Method and apparatus for dynamically shifting between routing and switching packets in a transmission network
US5905726A (en) * 1996-05-21 1999-05-18 Cisco Technology, Inc. Broadband communication system having a virtual circuit space switch
US5920562A (en) * 1996-11-22 1999-07-06 Sprint Communications Co. L.P. Systems and methods for providing enhanced services for telecommunication call
US5923740A (en) * 1997-03-21 1999-07-13 Fujitsu Limited Relief method of billing data in ATM switching system
US5943337A (en) * 1995-02-10 1999-08-24 Fujitsu Limited Method for an ATM network which controls settings of a plurality of connections and apparatus and assigns information which identifies applications
US5953338A (en) * 1996-12-13 1999-09-14 Northern Telecom Limited Dynamic control processes and systems for asynchronous transfer mode networks
US5956334A (en) * 1997-02-10 1999-09-21 At & T Corporation Method for interfacing a telephony and an ATM network to establish voice communication
US5970064A (en) * 1997-06-12 1999-10-19 Northern Telecom Limited Real time control architecture for admission control in communications network
US5974048A (en) * 1997-01-23 1999-10-26 Nortel Networks Corporation Distributed data processing system
US5991301A (en) * 1994-05-05 1999-11-23 Sprint Communications Co. L.P. Broadband telecommunications system
US5999518A (en) * 1996-12-04 1999-12-07 Alcatel Usa Sourcing, L.P. Distributed telecommunications switching system and method
US5999532A (en) * 1996-08-13 1999-12-07 Nec Corporation ATM line concentration apparatus
US6028924A (en) * 1996-06-13 2000-02-22 Northern Telecom Limited Apparatus and method for controlling processing of a service call
US6028933A (en) * 1997-04-17 2000-02-22 Lucent Technologies Inc. Encrypting method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network
US6031840A (en) * 1995-12-07 2000-02-29 Sprint Communications Co. L.P. Telecommunications system
US6032118A (en) * 1996-12-19 2000-02-29 Northern Telecom Limited Virtual private network service provider for asynchronous transfer mode network
US6035405A (en) * 1997-12-22 2000-03-07 Nortel Networks Corporation Secure virtual LANs
US6041056A (en) * 1995-03-28 2000-03-21 Bell Atlantic Network Services, Inc. Full service network having distributed architecture
US6041109A (en) * 1995-12-29 2000-03-21 Mci Communications Corporation Telecommunications system having separate switch intelligence and switch fabric
US6073160A (en) * 1996-12-18 2000-06-06 Xerox Corporation Document communications controller
US6081518A (en) * 1999-06-02 2000-06-27 Anderson Consulting System, method and article of manufacture for cross-location registration in a communication system architecture
US6094437A (en) * 1998-10-09 2000-07-25 Asc - Advanced Switching Communications Layer two tunneling protocol (L2TP) merging and management
US6097722A (en) * 1996-12-13 2000-08-01 Nortel Networks Corporation Bandwidth management processes and systems for asynchronous transfer mode networks using variable virtual paths
US6097720A (en) * 1998-04-07 2000-08-01 3Com Corporation Enabling multicast distribution efficiencies in a dialup access environment
US6118785A (en) * 1998-04-07 2000-09-12 3Com Corporation Point-to-point protocol with a signaling channel
US6137793A (en) * 1997-12-05 2000-10-24 Com21, Inc. Reverse path multiplexer for use in high speed data transmissions
US6141339A (en) * 1997-04-04 2000-10-31 Sprint Communications Company, L.P. Telecommunications system
US6148074A (en) * 1997-02-10 2000-11-14 Genesys Telecommunications Laboratories, Inc. Personal desktop router
US6167432A (en) * 1996-02-29 2000-12-26 Webex Communications, Inc., Method for creating peer-to-peer connections over an interconnected network to facilitate conferencing among users
US6169735B1 (en) * 1998-04-30 2001-01-02 Sbc Technology Resources, Inc. ATM-based distributed virtual tandem switching system
US6181693B1 (en) * 1998-10-08 2001-01-30 High Speed Video, L.L.C. High speed video transmission over telephone lines
US6222842B1 (en) * 1996-10-10 2001-04-24 Hewlett-Packard Company System providing for multiple virtual circuits between two network entities
US6229810B1 (en) * 1997-12-31 2001-05-08 At&T Corp Network server platform for a hybrid fiber twisted pair local loop network service architecture
US6252857B1 (en) * 1998-03-04 2001-06-26 At&T Corp. Method and apparatus for provisioned and dynamic quality of service in a communications network
US6292495B1 (en) * 1998-04-10 2001-09-18 Cisco Technology, Inc. Segmented permanent virtual circuits
US6298043B1 (en) * 1998-03-28 2001-10-02 Nortel Networks Limited Communication system architecture and a connection verification mechanism therefor
US20010026553A1 (en) * 2000-01-20 2001-10-04 Gallant John K. Intelligent policy server system and method for bandwidth control in an ATM network
US6345051B1 (en) * 1997-02-18 2002-02-05 Cisco Technology, Inc. Method and apparatus for multiplexing of multiple users on the same virtual circuit
US20020024954A1 (en) * 2000-08-08 2002-02-28 Sbc Technology Resources, Inc. Controller based call control for ATM SVC signaling
US6366948B1 (en) * 1998-12-18 2002-04-02 Intel Corporation Chat distribution service system for alternatively delivering the URL linked to a message determined by the chat client device to be unsuitable for distribution
US6366577B1 (en) * 1999-11-05 2002-04-02 Mci Worldcom, Inc. Method for providing IP telephony with QoS using end-to-end RSVP signaling
US6373930B1 (en) * 1999-09-09 2002-04-16 Sprint Communications Company L.P. Method and system for monitoring telecommunications traffic
US20020071427A1 (en) * 2000-08-07 2002-06-13 Sbc Technology Resources, Inc. Multiservice use of network connection capability
US6434612B1 (en) * 1997-12-10 2002-08-13 Cisco Technology, Inc. Connection control interface for asynchronous transfer mode switches
US20020156914A1 (en) * 2000-05-31 2002-10-24 Lo Waichi C. Controller for managing bandwidth in a communications network
US6473427B1 (en) * 1999-06-24 2002-10-29 Qwest Communications ATM based VDSL communication system having meta signaling for switching a subscriber between different data service providers
US20030016676A1 (en) * 2001-07-19 2003-01-23 Sbc Technology Resources, Inc. Austin, Texas Virtual private network over asynchronous transfer mode
US20030031184A1 (en) * 2001-08-13 2003-02-13 Sbc Technology Resources, Inc. Authentication for use of high speed network resources
US6529479B1 (en) * 1998-03-19 2003-03-04 Fujitsu Limited SVC accessing method for use in ATM-DSLAM
US6542475B1 (en) * 1999-08-09 2003-04-01 At&T Corp. Method and system for providing enhanced call service features at remote locations
US6563835B1 (en) * 1998-02-20 2003-05-13 Lucent Technologies Inc. Call processing arrangement for ATM switches
US20030128698A1 (en) * 1998-06-12 2003-07-10 Timothy Darland Intelligent services network using a switch controller
US20030133454A1 (en) * 1999-08-09 2003-07-17 John K. Gallant Method of and system for providing quality of service in ip telephony
US6618381B1 (en) * 1998-03-13 2003-09-09 Fujitsu Limited Network system and communication node
US6621793B2 (en) * 2000-05-22 2003-09-16 Telefonaktiebolaget Lm Ericsson (Publ) Application influenced policy
US6633569B2 (en) * 1998-04-16 2003-10-14 Samsung Electronics Co., Ltd. System and method for routing data cells through an ATM architecture using quality of service data in a service control point
US6636516B1 (en) * 1999-03-17 2003-10-21 Nec Corporation QOS-based virtual private network using ATM-based internet virtual connections
US6741585B1 (en) * 2000-05-05 2004-05-25 Lucent Technologies Inc. Interworking of addressing in an internetwork
US20040107238A1 (en) * 2000-01-26 2004-06-03 Orton Scott L. Method and apparatus for a SIP client manager
US6801508B1 (en) * 1999-05-11 2004-10-05 Lg Information & Communications, Ltd. Asynchronous transfer mode packet network and method for transferring packet data in the same
US6804247B1 (en) * 1996-10-10 2004-10-12 Hewlett-Packard Development Company, L.P. System providing for multiple virtual circuits between two network entities
US6807174B2 (en) * 1998-05-06 2004-10-19 Nortel Networks Limited Method and apparatus for transporting DS-X signals through a packet network
US6822962B1 (en) * 1999-11-29 2004-11-23 Hitachi Telecom Technologies, Ltd. Virtual connection switching method and ATM switch
US6842449B2 (en) * 2002-07-09 2005-01-11 Verisign, Inc. Method and system for registering and automatically retrieving digital-certificates in voice over internet protocol (VOIP) communications
US6859457B1 (en) * 1998-06-05 2005-02-22 Nec Corporation Substitution call control system in ATM communication network
US6870841B1 (en) * 2000-09-18 2005-03-22 At&T Corp. Controlled transmission across packet network
US6928167B1 (en) * 1999-06-02 2005-08-09 Hitachi, Ltd. Method for managing public key
US6937598B1 (en) * 1999-09-20 2005-08-30 Lucent Technologies Inc. Method and apparatus for transporting ATM cell traffic over IP networks
US6937595B2 (en) * 1997-12-31 2005-08-30 At&T Corp. Multifunction interface facility connecting wideband multiple access subscriber loops with various networks

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08186580A (en) 1994-12-28 1996-07-16 Toshiba Corp Communication system
JPH10107808A (en) 1996-10-03 1998-04-24 Fujitsu Ltd Virtual connection setting control system for cell exchange system
WO1998026627A1 (en) 1996-12-13 1998-06-18 Northern Telecom Limited Enhanced services for atm switching using external control
FI107691B (en) 1997-02-12 2001-09-14 Nokia Networks Oy Controlling mobility and call control in an ATM environment
US6111858A (en) 1997-02-18 2000-08-29 Virata Limited Proxy-controlled ATM subnetwork
JPH10308745A (en) * 1997-05-08 1998-11-17 Nec Corp Band managing method, subscriber exchange and relay exchange for atm network
CA2242219A1 (en) * 1997-10-03 1999-04-03 Newbridge Networks Corporation Classes of service in an mpoa network
JP3364148B2 (en) 1998-02-16 2003-01-08 富士通株式会社 Asynchronous transfer mode switch and control method therefor
JPH11266258A (en) * 1998-03-17 1999-09-28 Fujitsu Ltd Atm network device
US6317438B1 (en) 1998-04-14 2001-11-13 Harold Herman Trebes, Jr. System and method for providing peer-oriented control of telecommunications services
CA2239023A1 (en) 1998-05-28 1999-11-28 Newbridge Networks Corporation Partitioning of bandwidth, connection types, and service categories for switched services trunk groups
US6473430B2 (en) 1998-06-03 2002-10-29 Samsung Electronics Co., Ltd. Systems and methods for connecting frame relay devices via an ATM network using a frame relay proxy signaling agent
JP2000078145A (en) * 1998-08-28 2000-03-14 Fujitsu Ltd Boundary device conducting connection control at border of two communication networks and its method
WO2000019669A1 (en) * 1998-09-25 2000-04-06 Fujitsu Limited Method for repeating quality report information in atm network
US6289001B1 (en) 1998-10-15 2001-09-11 Telcordia Technologies, Inc. System and method for ATM proxy signaling
US6597689B1 (en) 1998-12-30 2003-07-22 Nortel Networks Limited SVC signaling system and method
US20020071472A1 (en) 1999-04-30 2002-06-13 Metrologic Instruments, Inc. DOE-based systems and devices for producing laser beams having modified beam characteristics
US6587467B1 (en) * 1999-11-03 2003-07-01 3Com Corporation Virtual channel multicast utilizing virtual path tunneling in asynchronous mode transfer networks
US20020010866A1 (en) 1999-12-16 2002-01-24 Mccullough David J. Method and apparatus for improving peer-to-peer bandwidth between remote networks by combining multiple connections which use arbitrary data paths
IL135554A0 (en) 2000-04-09 2001-05-20 Lea D Corp Ltd Method and system for end-to-end communication through the internet transmission infrastructure
EP1225785A1 (en) * 2000-10-27 2002-07-24 Alcatel Access control unit
US20020143959A1 (en) 2001-04-03 2002-10-03 David El-Baze Method and apparatus for interactive direct peer-to-peer multimedia streaming
US7088677B1 (en) * 2002-03-01 2006-08-08 Bellsouth Intellectual Property Corporation System and method for delay-based congestion detection and connection admission control

Patent Citations (84)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10866A (en) * 1854-05-02 Improvement in machinery for making rope
US143959A (en) * 1873-10-28 Improvement in buckets
US150110A (en) * 1874-04-21 Improvement in whitewash-brushes
US2999514A (en) * 1958-06-25 1961-09-12 Union Tank Car Co Controls for fluid treatment apparatus
US4494231A (en) * 1981-01-23 1985-01-15 Serge Slawy Time division switching system for circuit mode and packet mode channels
US5051982A (en) * 1989-07-27 1991-09-24 Data General Corporation Methods and apparatus for implementing switched virtual connections (SVCs) in a digital communications switching system
US5274643A (en) * 1992-12-11 1993-12-28 Stratacom, Inc. Method for optimizing a network having virtual circuit routing over virtual paths
US5991301A (en) * 1994-05-05 1999-11-23 Sprint Communications Co. L.P. Broadband telecommunications system
US5490141A (en) * 1994-09-30 1996-02-06 International Business Machines Corporation System and method for providing SVC service through an ATM network for frame relay DTEs with a terminal adapter
US5610969A (en) * 1994-12-23 1997-03-11 Bell Atlantic Mobile Systems, Inc. Personal communication service registration system and method
US5943337A (en) * 1995-02-10 1999-08-24 Fujitsu Limited Method for an ATM network which controls settings of a plurality of connections and apparatus and assigns information which identifies applications
US6041056A (en) * 1995-03-28 2000-03-21 Bell Atlantic Network Services, Inc. Full service network having distributed architecture
US6031840A (en) * 1995-12-07 2000-02-29 Sprint Communications Co. L.P. Telecommunications system
US6041109A (en) * 1995-12-29 2000-03-21 Mci Communications Corporation Telecommunications system having separate switch intelligence and switch fabric
US5892924A (en) * 1996-01-31 1999-04-06 Ipsilon Networks, Inc. Method and apparatus for dynamically shifting between routing and switching packets in a transmission network
US6167432A (en) * 1996-02-29 2000-12-26 Webex Communications, Inc., Method for creating peer-to-peer connections over an interconnected network to facilitate conferencing among users
US5905726A (en) * 1996-05-21 1999-05-18 Cisco Technology, Inc. Broadband communication system having a virtual circuit space switch
US5764645A (en) * 1996-06-12 1998-06-09 Microsoft Corporation IP/ATM network adaptation
US6028924A (en) * 1996-06-13 2000-02-22 Northern Telecom Limited Apparatus and method for controlling processing of a service call
US5842040A (en) * 1996-06-18 1998-11-24 Storage Technology Corporation Policy caching method and apparatus for use in a communication device based on contents of one data unit in a subset of related data units
US5828838A (en) * 1996-06-20 1998-10-27 Intel Corporation Method and apparatus for conducting multi-point electronic conferences
US5999532A (en) * 1996-08-13 1999-12-07 Nec Corporation ATM line concentration apparatus
US6222842B1 (en) * 1996-10-10 2001-04-24 Hewlett-Packard Company System providing for multiple virtual circuits between two network entities
US6804247B1 (en) * 1996-10-10 2004-10-12 Hewlett-Packard Development Company, L.P. System providing for multiple virtual circuits between two network entities
US5920562A (en) * 1996-11-22 1999-07-06 Sprint Communications Co. L.P. Systems and methods for providing enhanced services for telecommunication call
US5999518A (en) * 1996-12-04 1999-12-07 Alcatel Usa Sourcing, L.P. Distributed telecommunications switching system and method
US5953338A (en) * 1996-12-13 1999-09-14 Northern Telecom Limited Dynamic control processes and systems for asynchronous transfer mode networks
US6097722A (en) * 1996-12-13 2000-08-01 Nortel Networks Corporation Bandwidth management processes and systems for asynchronous transfer mode networks using variable virtual paths
US6073160A (en) * 1996-12-18 2000-06-06 Xerox Corporation Document communications controller
US6032118A (en) * 1996-12-19 2000-02-29 Northern Telecom Limited Virtual private network service provider for asynchronous transfer mode network
US5974048A (en) * 1997-01-23 1999-10-26 Nortel Networks Corporation Distributed data processing system
US5956334A (en) * 1997-02-10 1999-09-21 At & T Corporation Method for interfacing a telephony and an ATM network to establish voice communication
US6148074A (en) * 1997-02-10 2000-11-14 Genesys Telecommunications Laboratories, Inc. Personal desktop router
US6345051B1 (en) * 1997-02-18 2002-02-05 Cisco Technology, Inc. Method and apparatus for multiplexing of multiple users on the same virtual circuit
US5923740A (en) * 1997-03-21 1999-07-13 Fujitsu Limited Relief method of billing data in ATM switching system
US6141339A (en) * 1997-04-04 2000-10-31 Sprint Communications Company, L.P. Telecommunications system
US6028933A (en) * 1997-04-17 2000-02-22 Lucent Technologies Inc. Encrypting method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network
US5970064A (en) * 1997-06-12 1999-10-19 Northern Telecom Limited Real time control architecture for admission control in communications network
US6137793A (en) * 1997-12-05 2000-10-24 Com21, Inc. Reverse path multiplexer for use in high speed data transmissions
US6434612B1 (en) * 1997-12-10 2002-08-13 Cisco Technology, Inc. Connection control interface for asynchronous transfer mode switches
US6035405A (en) * 1997-12-22 2000-03-07 Nortel Networks Corporation Secure virtual LANs
US6229810B1 (en) * 1997-12-31 2001-05-08 At&T Corp Network server platform for a hybrid fiber twisted pair local loop network service architecture
US6937595B2 (en) * 1997-12-31 2005-08-30 At&T Corp. Multifunction interface facility connecting wideband multiple access subscriber loops with various networks
US6563835B1 (en) * 1998-02-20 2003-05-13 Lucent Technologies Inc. Call processing arrangement for ATM switches
US6252857B1 (en) * 1998-03-04 2001-06-26 At&T Corp. Method and apparatus for provisioned and dynamic quality of service in a communications network
US6618381B1 (en) * 1998-03-13 2003-09-09 Fujitsu Limited Network system and communication node
US6529479B1 (en) * 1998-03-19 2003-03-04 Fujitsu Limited SVC accessing method for use in ATM-DSLAM
US6298043B1 (en) * 1998-03-28 2001-10-02 Nortel Networks Limited Communication system architecture and a connection verification mechanism therefor
US6118785A (en) * 1998-04-07 2000-09-12 3Com Corporation Point-to-point protocol with a signaling channel
US6097720A (en) * 1998-04-07 2000-08-01 3Com Corporation Enabling multicast distribution efficiencies in a dialup access environment
US6292495B1 (en) * 1998-04-10 2001-09-18 Cisco Technology, Inc. Segmented permanent virtual circuits
US6633569B2 (en) * 1998-04-16 2003-10-14 Samsung Electronics Co., Ltd. System and method for routing data cells through an ATM architecture using quality of service data in a service control point
US6219348B1 (en) * 1998-04-30 2001-04-17 Sbc Technology Resources, Inc. ATM-based distributed virtual tandem switching system
US6345048B1 (en) * 1998-04-30 2002-02-05 Sbc Technology Resources, Inc. ATM-based distributed virtual tandem switching system
US6169735B1 (en) * 1998-04-30 2001-01-02 Sbc Technology Resources, Inc. ATM-based distributed virtual tandem switching system
US6389011B2 (en) * 1998-04-30 2002-05-14 Sbc Technology Resources, Inc. ATM-based distributed virtual tandem switching system
US6807174B2 (en) * 1998-05-06 2004-10-19 Nortel Networks Limited Method and apparatus for transporting DS-X signals through a packet network
US6859457B1 (en) * 1998-06-05 2005-02-22 Nec Corporation Substitution call control system in ATM communication network
US20030128698A1 (en) * 1998-06-12 2003-07-10 Timothy Darland Intelligent services network using a switch controller
US6181693B1 (en) * 1998-10-08 2001-01-30 High Speed Video, L.L.C. High speed video transmission over telephone lines
US6094437A (en) * 1998-10-09 2000-07-25 Asc - Advanced Switching Communications Layer two tunneling protocol (L2TP) merging and management
US6366948B1 (en) * 1998-12-18 2002-04-02 Intel Corporation Chat distribution service system for alternatively delivering the URL linked to a message determined by the chat client device to be unsuitable for distribution
US6636516B1 (en) * 1999-03-17 2003-10-21 Nec Corporation QOS-based virtual private network using ATM-based internet virtual connections
US6801508B1 (en) * 1999-05-11 2004-10-05 Lg Information & Communications, Ltd. Asynchronous transfer mode packet network and method for transferring packet data in the same
US6928167B1 (en) * 1999-06-02 2005-08-09 Hitachi, Ltd. Method for managing public key
US6081518A (en) * 1999-06-02 2000-06-27 Anderson Consulting System, method and article of manufacture for cross-location registration in a communication system architecture
US6473427B1 (en) * 1999-06-24 2002-10-29 Qwest Communications ATM based VDSL communication system having meta signaling for switching a subscriber between different data service providers
US20030133454A1 (en) * 1999-08-09 2003-07-17 John K. Gallant Method of and system for providing quality of service in ip telephony
US6542475B1 (en) * 1999-08-09 2003-04-01 At&T Corp. Method and system for providing enhanced call service features at remote locations
US6373930B1 (en) * 1999-09-09 2002-04-16 Sprint Communications Company L.P. Method and system for monitoring telecommunications traffic
US6937598B1 (en) * 1999-09-20 2005-08-30 Lucent Technologies Inc. Method and apparatus for transporting ATM cell traffic over IP networks
US6366577B1 (en) * 1999-11-05 2002-04-02 Mci Worldcom, Inc. Method for providing IP telephony with QoS using end-to-end RSVP signaling
US6822962B1 (en) * 1999-11-29 2004-11-23 Hitachi Telecom Technologies, Ltd. Virtual connection switching method and ATM switch
US20010026553A1 (en) * 2000-01-20 2001-10-04 Gallant John K. Intelligent policy server system and method for bandwidth control in an ATM network
US20040107238A1 (en) * 2000-01-26 2004-06-03 Orton Scott L. Method and apparatus for a SIP client manager
US6741585B1 (en) * 2000-05-05 2004-05-25 Lucent Technologies Inc. Interworking of addressing in an internetwork
US6621793B2 (en) * 2000-05-22 2003-09-16 Telefonaktiebolaget Lm Ericsson (Publ) Application influenced policy
US20020156914A1 (en) * 2000-05-31 2002-10-24 Lo Waichi C. Controller for managing bandwidth in a communications network
US20020071427A1 (en) * 2000-08-07 2002-06-13 Sbc Technology Resources, Inc. Multiservice use of network connection capability
US20020024954A1 (en) * 2000-08-08 2002-02-28 Sbc Technology Resources, Inc. Controller based call control for ATM SVC signaling
US6870841B1 (en) * 2000-09-18 2005-03-22 At&T Corp. Controlled transmission across packet network
US20030016676A1 (en) * 2001-07-19 2003-01-23 Sbc Technology Resources, Inc. Austin, Texas Virtual private network over asynchronous transfer mode
US20030031184A1 (en) * 2001-08-13 2003-02-13 Sbc Technology Resources, Inc. Authentication for use of high speed network resources
US6842449B2 (en) * 2002-07-09 2005-01-11 Verisign, Inc. Method and system for registering and automatically retrieving digital-certificates in voice over internet protocol (VOIP) communications

Cited By (93)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7889717B2 (en) 2000-08-07 2011-02-15 At&T Labs, Inc. Multiservice use of network connection capability
US20040172485A1 (en) * 2001-04-11 2004-09-02 Kianoosh Naghshineh Multi-purpose switching network interface controller
US8032655B2 (en) 2001-04-11 2011-10-04 Chelsio Communications, Inc. Configurable switching network interface controller using forwarding engine
US20090097499A1 (en) * 2001-04-11 2009-04-16 Chelsio Communications, Inc. Multi-purpose switching network interface controller
US7447795B2 (en) 2001-04-11 2008-11-04 Chelsio Communications, Inc. Multi-purpose switching network interface controller
US20040177107A1 (en) * 2003-02-26 2004-09-09 Wu Qing Method for providing services with guaranteed quality of service in IP access network
US10237190B2 (en) 2003-05-15 2019-03-19 At&T Intellectual Property I, L.P. Methods of implementing dynamic quality of service or bandwidth provisioning
US7739386B2 (en) * 2003-05-15 2010-06-15 At&T Intellectual Property I, L.P. Data architectures for managing quality of service and/or bandwidth allocation in a regional/access network (RAN)
US10958582B2 (en) 2003-05-15 2021-03-23 At&T Intellectual Property I, L.P. Methods of implementing dynamic quality of service or bandwidth provisioning
US20040228356A1 (en) * 2003-05-15 2004-11-18 Maria Adamczyk Methods of providing data services over data networks and related data networks, data service providers, routing gateways and computer program products
US20050002335A1 (en) * 2003-05-15 2005-01-06 Maria Adamczyk Methods of implementing dynamic QoS and/or bandwidth provisioning and related data networks, data service providers, routing gateways, and computer program products
US8174970B2 (en) * 2003-05-15 2012-05-08 At&T Intellectual Property I, L.P. Methods of implementing dynamic QoS and/or bandwidth provisioning and related data networks, data service providers, routing gateways, and computer program products
US20100195666A1 (en) * 2003-05-15 2010-08-05 Maria Adamczyk Methods of Operating Data Networks To Provide Data Services and Related Methods of Operating Data Service Providers and Routing Gateways
US7684432B2 (en) 2003-05-15 2010-03-23 At&T Intellectual Property I, L.P. Methods of providing data services over data networks and related data networks, data service providers, routing gateways and computer program products
US8787161B2 (en) 2003-05-15 2014-07-22 At&T Intellectual Property I, Lp. Methods of implementing dynamic quality of service or bandwidth provisioning
US9225655B2 (en) 2003-05-15 2015-12-29 At&T Intellectual Property I, Lp Methods of implementing dynamic quality of service or bandwidth provisioning
US20050015494A1 (en) * 2003-05-15 2005-01-20 Maria Adamczyk Data architectures for managing quality of service and/or bandwidth allocation in a regional/access network (RAN)
US8036237B2 (en) * 2003-05-16 2011-10-11 Tut Systems, Inc. System and method for transparent virtual routing
US20080212598A1 (en) * 2003-05-16 2008-09-04 Tut Systems, Inc. System and Method for Transparent Virtual Routing
US20050226232A1 (en) * 2003-06-24 2005-10-13 Tan-Nhon Pham Differentiated management of non-umts traffic in a umts access network
US8155132B2 (en) * 2003-07-14 2012-04-10 Alcatel Lucent Method for setting up a connection
US20050013301A1 (en) * 2003-07-14 2005-01-20 Alcatel Method for setting up a connection
US9807460B2 (en) * 2003-08-11 2017-10-31 Arris Enterprises, Inc. Optimal provisioning and management of bandwidth in a video-on-demand services architecture
US20050039213A1 (en) * 2003-08-11 2005-02-17 Joseph Matarese Optimal provisioning and management of bandwidth in a video-on-demand services architecture
US8661158B2 (en) 2003-12-10 2014-02-25 Aventail Llc Smart tunneling to resources in a network
US8613041B2 (en) 2003-12-10 2013-12-17 Aventail Llc Creating rules for routing resource access requests
US20100024008A1 (en) * 2003-12-10 2010-01-28 Chris Hopen Managing Resource Allocations
US9197538B2 (en) * 2003-12-10 2015-11-24 Aventail Llc Rule-based routing to resources through a network
US10003576B2 (en) 2003-12-10 2018-06-19 Sonicwall Inc. Rule-based routing to resources through a network
US20100036955A1 (en) * 2003-12-10 2010-02-11 Chris Hopen Creating Rules For Routing Resource Access Requests
US10135827B2 (en) 2003-12-10 2018-11-20 Sonicwall Inc. Secure access to remote resources over a network
US20110167475A1 (en) * 2003-12-10 2011-07-07 Paul Lawrence Hoover Secure Access to Remote Resources Over a Network
US20140053237A1 (en) * 2003-12-10 2014-02-20 Aventail Llc Rule-based routing to resources through a network
US8615796B2 (en) 2003-12-10 2013-12-24 Aventail Llc Managing resource allocations
US9300670B2 (en) 2003-12-10 2016-03-29 Aventail Llc Remote access to resources over a network
US9906534B2 (en) 2003-12-10 2018-02-27 Sonicwall Inc. Remote access to resources over a network
US20070061887A1 (en) * 2003-12-10 2007-03-15 Aventail Corporation Smart tunneling to resources in a network
US8590032B2 (en) * 2003-12-10 2013-11-19 Aventail Llc Rule-based routing to resources through a network
US20060143703A1 (en) * 2003-12-10 2006-06-29 Chris Hopen Rule-based routing to resources through a network
US9397927B2 (en) 2003-12-10 2016-07-19 Aventail Llc Rule-based routing to resources through a network
US9407456B2 (en) 2003-12-10 2016-08-02 Aventail Llc Secure access to remote resources over a network
US9628489B2 (en) 2003-12-10 2017-04-18 Sonicwall Inc. Remote access to resources over a network
US10313350B2 (en) 2003-12-10 2019-06-04 Sonicwall Inc. Remote access to resources over a network
US8451833B2 (en) 2004-05-14 2013-05-28 Motorola Mobility Llc System and method for transparent virtual routing
US20080151906A1 (en) * 2004-05-14 2008-06-26 Tut Systems, Inc. System and Method for Transparent Virtual Routing
US7945705B1 (en) * 2004-05-25 2011-05-17 Chelsio Communications, Inc. Method for using a protocol language to avoid separate channels for control messages involving encapsulated payload data messages
US7831745B1 (en) 2004-05-25 2010-11-09 Chelsio Communications, Inc. Scalable direct memory access using validation of host and scatter gather engine (SGE) generation indications
US8601550B2 (en) 2004-06-24 2013-12-03 Aventail Llc Remote access to resources over a network
US20110167101A1 (en) * 2004-06-24 2011-07-07 Chris Hopen End Point Control
US7903553B2 (en) * 2004-08-05 2011-03-08 Huawei Technologies Co., Ltd. Method, apparatus, edge router and system for providing QoS guarantee
US20080025218A1 (en) * 2004-08-05 2008-01-31 Enhui Liu Method, Apparatus, Edge Router and System for Providing Qos Guarantee
US20060039381A1 (en) * 2004-08-20 2006-02-23 Anschutz Thomas Arnold Methods, systems, and computer program products for modifying bandwidth and/or quality of service in a core network
US7545788B2 (en) 2004-08-20 2009-06-09 At&T Intellectual Property I, L.P. Methods, systems, and computer program products for modifying bandwidth and/or quality of service in a core network
US20060155778A1 (en) * 2004-12-03 2006-07-13 Oracle International Corporation Updateable fan-out replication with reconfigurable master association
US7734585B2 (en) 2004-12-03 2010-06-08 Oracle International Corporation Updateable fan-out replication with reconfigurable master association
WO2007003875A1 (en) * 2005-07-06 2007-01-11 Wei Huang Method and apparatus for quality guaranteed video services
US7724658B1 (en) 2005-08-31 2010-05-25 Chelsio Communications, Inc. Protocol offload transmit traffic management
US8339952B1 (en) 2005-08-31 2012-12-25 Chelsio Communications, Inc. Protocol offload transmit traffic management
US8139482B1 (en) 2005-08-31 2012-03-20 Chelsio Communications, Inc. Method to implement an L4-L7 switch using split connections and an offloading NIC
US7616563B1 (en) 2005-08-31 2009-11-10 Chelsio Communications, Inc. Method to implement an L4-L7 switch using split connections and an offloading NIC
US8155001B1 (en) 2005-08-31 2012-04-10 Chelsio Communications, Inc. Protocol offload transmit traffic management
US7760733B1 (en) 2005-10-13 2010-07-20 Chelsio Communications, Inc. Filtering ingress packets in network interface circuitry
US7715436B1 (en) 2005-11-18 2010-05-11 Chelsio Communications, Inc. Method for UDP transmit protocol offload processing with traffic management
US20070116004A1 (en) * 2005-11-22 2007-05-24 Kuk Chang Kang Method and apparatus for guaranteeing QoS using end-to-end CAC in internet service network
US8213427B1 (en) 2005-12-19 2012-07-03 Chelsio Communications, Inc. Method for traffic scheduling in intelligent network interface circuitry
US7660264B1 (en) 2005-12-19 2010-02-09 Chelsio Communications, Inc. Method for traffic schedulign in intelligent network interface circuitry
US7660306B1 (en) 2006-01-12 2010-02-09 Chelsio Communications, Inc. Virtualizing the operation of intelligent network interface circuitry
US8686838B1 (en) 2006-01-12 2014-04-01 Chelsio Communications, Inc. Virtualizing the operation of intelligent network interface circuitry
US7924840B1 (en) 2006-01-12 2011-04-12 Chelsio Communications, Inc. Virtualizing the operation of intelligent network interface circuitry
US20080025299A1 (en) * 2006-07-28 2008-01-31 Cisco Technology, Inc. Techniques for exchanging DHCP information among DHCP relay agents and DHCP servers
US7586912B2 (en) * 2006-07-28 2009-09-08 Cisco Technology, Inc. Techniques for exchanging DHCP information among DHCP relay agents and DHCP servers
US20080109559A1 (en) * 2006-11-03 2008-05-08 Cisco Technology, Inc. Automatically controlling operation of a BRAS device based on encapsulation information
US7821941B2 (en) 2006-11-03 2010-10-26 Cisco Technology, Inc. Automatically controlling operation of a BRAS device based on encapsulation information
US20110216779A1 (en) * 2006-12-27 2011-09-08 Entry Point, Llc System and method to provide multiple private networks using pbb
US7843944B2 (en) 2006-12-27 2010-11-30 Entry Point, Llc System and method to provide multiple private networks using MPLS
US8477620B2 (en) 2006-12-27 2013-07-02 Entry Point, Llc System and method to provide multiple private networks using PBB
US20080159298A1 (en) * 2006-12-27 2008-07-03 Entry Point, Llc System and method to provide multiple private networks
US8582580B2 (en) 2006-12-27 2013-11-12 Entry Point, Llc System and method to provide multiple private networks using PBB/TE
US20080310424A1 (en) * 2006-12-27 2008-12-18 Entry Point, Llc System and method to provide multiple private networks using mpls
US9537878B1 (en) 2007-04-16 2017-01-03 Chelsio Communications, Inc. Network adaptor configured for connection establishment offload
US8935406B1 (en) 2007-04-16 2015-01-13 Chelsio Communications, Inc. Network adaptor configured for connection establishment offload
US8589587B1 (en) 2007-05-11 2013-11-19 Chelsio Communications, Inc. Protocol offload in intelligent network adaptor, including application level signalling
US7826350B1 (en) 2007-05-11 2010-11-02 Chelsio Communications, Inc. Intelligent network adaptor with adaptive direct data placement scheme
US8356112B1 (en) 2007-05-11 2013-01-15 Chelsio Communications, Inc. Intelligent network adaptor with end-to-end flow control
US8060644B1 (en) 2007-05-11 2011-11-15 Chelsio Communications, Inc. Intelligent network adaptor with end-to-end flow control
US7831720B1 (en) 2007-05-17 2010-11-09 Chelsio Communications, Inc. Full offload of stateful connections, with partial connection offload
US8897134B2 (en) * 2010-06-25 2014-11-25 Telefonaktiebolaget L M Ericsson (Publ) Notifying a controller of a change to a packet forwarding configuration of a network element over a communication channel
US20110317559A1 (en) * 2010-06-25 2011-12-29 Kern Andras Notifying a Controller of a Change to a Packet Forwarding Configuration of a Network Element Over a Communication Channel
US20150334115A1 (en) * 2012-04-12 2015-11-19 Hewlett-Packard Development Company, L.P. Dynamic provisioning of virtual systems
US10447818B2 (en) * 2012-11-21 2019-10-15 Qatar Foundation Methods, remote access systems, client computing devices, and server devices for use in remote access systems
US20150296051A1 (en) * 2012-11-21 2015-10-15 Qatar Foundation Methods, remote access systems, client computing devices, and server devices for use in remote access systems
US20160227229A1 (en) * 2015-02-04 2016-08-04 Harris Corporation Mobile ad hoc network media aware networking element
US11025752B1 (en) 2015-07-20 2021-06-01 Chelsio Communications, Inc. Method to integrate co-processors with a protocol processing pipeline

Also Published As

Publication number Publication date
US7382785B2 (en) 2008-06-03
US20080175250A1 (en) 2008-07-24
US7839866B2 (en) 2010-11-23

Similar Documents

Publication Publication Date Title
US7382785B2 (en) Extended virtual user-to-network interface with ATM network
US8199760B2 (en) Peer to peer SVC-based DSL service
US8780919B2 (en) Intelligent policy server system and method for bandwidth control in an ATM network
US7701953B2 (en) Client server SVC-based DSL service
JP3266534B2 (en) Operating method of communication network
CA2217275C (en) Multiple internetworking realms within an internetworking device
US20040153556A1 (en) Connections on demand between subscribers and service providers
US6359889B1 (en) Cell switching device for controlling a fixed rate connection
US6418126B1 (en) Wireless ATM networks
JP4502692B2 (en) SVC / SPVC with L3IP forwarding
Cisco ATM Commands
Cisco ATM Commands
Cisco ATM Commands
Cisco ATM Commands
Cisco ATM Commands
Cisco ATM Commands for the ATM Switch
Cisco ATM Commands
Cisco ATM Commands
Cisco ATM Commands for the LightStream 1010 ATM Switch
Song et al. Quality of Service development in the vBNS
Veeraraghavan et al. Parallel connection control (PCC) algorithm for ATM networks
Behringer et al. Project Title: TEN-34 Deliverable D14. 2 Results of Phase 2 Test Programme
Pacyna et al. DIGITAL VIDEO BASED EDUCATIONAL SERVICE IN AN ATM ACCESS NETWORK SUPPORTING IPV6/RSVP PROTOCOL SUITE

Legal Events

Date Code Title Description
AS Assignment

Owner name: SBC PROPERTIES, L.P., NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHEN, WENGE;CHOU, PETER;LIU, KUO-HUI;AND OTHERS;REEL/FRAME:014153/0427;SIGNING DATES FROM 20030428 TO 20030429

AS Assignment

Owner name: AT&T KNOWLEDGE VENTURES, L.P., NEVADA

Free format text: CHANGE OF NAME;ASSIGNOR:SBC KNOWLEDGE VENTURES, L.P.;REEL/FRAME:020637/0793

Effective date: 20060317

Owner name: SBC KNOWLEDGE VENTURES, L.P., NEVADA

Free format text: CHANGE OF NAME;ASSIGNOR:SBC PROPERTIES, L.P.;REEL/FRAME:020637/0682

Effective date: 20030613

CC Certificate of correction
REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20120603